The intense on-track action at the July 27, 2025, Belgian Grand Prix at Spa-Francorchamps was matched by a surge in sophisticated cybercriminal activity, according to cybersecurity experts. The event’s immense global attraction, heightened by the popular sprint race format and intense driver rivalries, created a fertile ground for threat actors to launch multifaceted campaigns.
These operations targeted the high-value intellectual property of Formula 1 teams and the sensitive personal data of millions of fans, turning a premier sporting spectacle into a high-risk digital environment.
Formula 1’s competitive edge is increasingly defined by data, making teams prime targets for cyber espionage.
The sport’s reliance on advanced telemetry systems, which process a constant stream of real-time data—from tire thermodynamics to intricate engine metrics metrics is critical for strategic optimization. This proprietary information represents invaluable intellectual property (IP), and its theft could grant rivals a significant competitive advantage. Consequently, state-sponsored and corporate threat actors view F1 teams as high-value targets, probing their networks for vulnerabilities to exfiltrate designs, race strategies, and performance data.
While teams faced espionage threats, fans were subjected to a barrage of social engineering and phishing attacks. A significant breach occurred in early 2024 when the official event email system was compromised, allowing attackers to launch highly convincing spear-phishing campaigns. These emails, appearing to be from race organizers, successfully tricked numerous fans into submitting credit card details for non-existent ticket packages.
The goal of these operations is the mass harvesting of personal identifiable information (PII) and financial credentials, which can be sold on dark web marketplaces or used for further fraud.
The cyber threats extended far beyond direct email phishing. Malicious actors leveraged multiple digital platforms to exploit fan enthusiasm. Social media channels were flooded with impersonation scams, where fake accounts posing as popular teams like McLaren used bait-and-switch tactics, promising exclusive paddock passes or merchandise giveaways to lure users into divulging PII or paying fraudulent “processing fees.”
Furthermore, illicit streaming sites offering free 4K race broadcasts were often bundled with malware droppers. These programs exploit unpatched system vulnerabilities to install keyloggers and credential stealers onto viewers’ devices.
The fraudulent activity also permeated e-commerce, with rogue marketplaces and typo-squatted domains proliferating online. These sites, which cleverly mimic legitimate vendors, offered counterfeit merchandise and fraudulent Non-Fungible Tokens (NFTs) tied to the Grand Prix. By using domain names that are slight misspellings of official ones, these criminals effectively evade many standard Domain Name System (DNS) security controls. This tactic capitalizes on simple user errors to direct unsuspecting fans to malicious sites designed to steal money and data, highlighting the comprehensive and evasive nature of the cyber threat surrounding major sporting events.
Reference: