Fake BTS ARIRANG tour tickets: K-pop fans being targeted by scammers | Kaspersky official blog
Cybercriminals are exploiting the high demand for BTS ARIRANG world-tour tickets by creating fake websites that mimic official ticket sales pages. These fraudulent sites, identified in multiple countries including Brazil, Mexico, and France, trick fans into making payments via instant payment systems like Brazil's PIX or fake card payment options that ultimately fail, coercing victims to pay through scam-controlled channels. The scam leverages social engineering tactics, exploiting fans' urgency and confusion around new ticket purchasing processes. Victims risk losing money with little chance of recovery due to the use of money mule accounts. Kaspersky advises purchasing tickets only through official channels and provides guidance on recognizing fake sites and protecting personal financial information.
AI Analysis
Technical Summary
Following BTS's comeback and announcement of their ARIRANG world tour, scammers launched phishing campaigns using fake websites that closely replicate official ticket pre-sale pages across several countries. These sites simulate legitimate purchasing workflows, including payment options, but direct payments to fraudulent accounts, especially exploiting Brazil's PIX instant payment system. The scam capitalizes on fans' eagerness and confusion about new ticketing procedures, employing fake error messages to pressure victims into using scam-preferred payment methods. Kaspersky identified at least 10 such fraudulent domains and provides detailed advice on avoiding these scams.
Potential Impact
Fans attempting to purchase BTS ARIRANG tour tickets from these fake websites risk financial loss as payments are directed to scam-controlled accounts, often via instant payment systems like PIX. The scam's design makes it difficult to recover funds. Additionally, victims who provide card information may face unauthorized transactions. The fraudulent sites undermine trust in official ticketing processes and exploit social engineering to induce panic and impulsive payments.
Mitigation Recommendations
No official patch applies as this is a phishing scam. Users should only purchase tickets through official BTS or event organizer websites, accessed by typing URLs directly rather than following links from social media or messages. Carefully verify website domains for subtle alterations and check for the presence of Privacy Policy and Terms of Use pages, though their presence alone does not guarantee legitimacy. In Brazil, avoid making online payments during pre-sale, as payments should be made in person. If scammed, immediately contact your bank to block or reissue cards and enable real-time banking alerts. Employ cybersecurity solutions capable of detecting and blocking fraudulent websites. Follow vendor guidance from official BTS and ticketing sources.
Affected Countries
Argentina, Brazil, Chile, Colombia, France, Mexico, Peru, Portugal, Spain
Fake BTS ARIRANG tour tickets: K-pop fans being targeted by scammers | Kaspersky official blog
Description
Cybercriminals are exploiting the high demand for BTS ARIRANG world-tour tickets by creating fake websites that mimic official ticket sales pages. These fraudulent sites, identified in multiple countries including Brazil, Mexico, and France, trick fans into making payments via instant payment systems like Brazil's PIX or fake card payment options that ultimately fail, coercing victims to pay through scam-controlled channels. The scam leverages social engineering tactics, exploiting fans' urgency and confusion around new ticket purchasing processes. Victims risk losing money with little chance of recovery due to the use of money mule accounts. Kaspersky advises purchasing tickets only through official channels and provides guidance on recognizing fake sites and protecting personal financial information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Following BTS's comeback and announcement of their ARIRANG world tour, scammers launched phishing campaigns using fake websites that closely replicate official ticket pre-sale pages across several countries. These sites simulate legitimate purchasing workflows, including payment options, but direct payments to fraudulent accounts, especially exploiting Brazil's PIX instant payment system. The scam capitalizes on fans' eagerness and confusion about new ticketing procedures, employing fake error messages to pressure victims into using scam-preferred payment methods. Kaspersky identified at least 10 such fraudulent domains and provides detailed advice on avoiding these scams.
Potential Impact
Fans attempting to purchase BTS ARIRANG tour tickets from these fake websites risk financial loss as payments are directed to scam-controlled accounts, often via instant payment systems like PIX. The scam's design makes it difficult to recover funds. Additionally, victims who provide card information may face unauthorized transactions. The fraudulent sites undermine trust in official ticketing processes and exploit social engineering to induce panic and impulsive payments.
Mitigation Recommendations
No official patch applies as this is a phishing scam. Users should only purchase tickets through official BTS or event organizer websites, accessed by typing URLs directly rather than following links from social media or messages. Carefully verify website domains for subtle alterations and check for the presence of Privacy Policy and Terms of Use pages, though their presence alone does not guarantee legitimacy. In Brazil, avoid making online payments during pre-sale, as payments should be made in person. If scammed, immediately contact your bank to block or reissue cards and enable real-time banking alerts. Employ cybersecurity solutions capable of detecting and blocking fraudulent websites. Follow vendor guidance from official BTS and ticketing sources.
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/bts-world-tour-scam/55581/","fetched":true,"fetchedAt":"2026-04-10T00:24:51.079Z","wordCount":1248}
Threat ID: 69d843531cc7ad14da3f941e
Added to database: 4/10/2026, 12:24:51 AM
Last enriched: 4/10/2026, 12:24:59 AM
Last updated: 4/10/2026, 8:17:45 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.