Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Capita Faces Data Breach in Civil Service Pension System

April 16, 2026

North Korea Hacks macOS Users’ Data with ClickFix

April 16, 2026

Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed

April 16, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Elon-Trump Feud Sparks Surge in Malicious Domain Activit
Uncategorized

Elon-Trump Feud Sparks Surge in Malicious Domain Activit

Staff WriterBy Staff WriterJune 18, 2025No Comments5 Mins Read4 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


In response to the escalating public trade policy feud between Elon Musk and Donald Trump — amplified by political tensions, social media clashes, and media coverage — threat actors are attempting to capitalize on this new, high-profile rivalry to register and weaponize a broad array of malicious domains.

PreCrime™ Labs, the threat research team at BforeAI, has identified multiple domains being used to proliferate crypto scams, phishing, fake betting sites, impersonation schemes, and engagement farming, leveraging the notoriety of both figures to lure victims.

Key Insights

Publicized online disputes, especially between celebrities or political figures, are repeatedly used as social engineering bait. In this case, multiple domains related to hypothetical Trump vs. Elon conflicts have surfaced, often mimicking betting platforms, fake giveaways, or crypto multipliers. Threat actors are using a wide range of low-cost and under-regulated top level domains (TLDs), including “.xyz”, “.space”, “.wtf”, “.live”, “.info”, “.fun”, “.store”, “.icu”, and “.online”, indicating abuse-friendly zones. Such TLDs are also known for their ongoing malicious use for hosting and conducting phishing campaigns.

Cyber Technology Insights : Cyber A.I. Group Appoints Irving Bruckstein as Director of Global Technology Integration

In the case of the Donald Trump and Elon Musk feud, once Musk publicly voiced his distaste for Trump’s “big beautiful bill” on June 4, 2025, cybercriminals leapt into action, creating at least 39 new domains aimed at scamming and defrauding internet users. All of these new domains were registered in the following two days, on June 5 and 6, 2025.

A wide range of typical TLDs were employed; however, “.com” had the most with 21. This is notable as “.com” is considered a more familiar and reputable TLD, indicating that the criminals were seeking to gain credibility with potential users.

The next largest cluster belongs the “.xyz” with 5 domains, followed by “.info” (3), “.online” and “.fun” (2 each) and “.space”, “.wtf”, “.live”, “.site”, “.store”, and “.icu” (with one each).

The team also observed a surge in the use of thematic keywords, delivering the relevance of the event on which it is based. For example, URLs containing keywords like “trumpvselon”, “elonvstrump”, “elonprivateaccess”, “trumploveselon”, “trumpmuskfeud”. Then, keywords such as “crypto”, “billiondollar”, “betting”, “private access”, and “game” were tied to the above set of keywords to establish the category of their operations, for example, to host fake apps, contests, etc., as discussed with examples below.

Cyber Technology Insights : NuHarbor Security Recognized as Top Workplace by VermontBiz, Best Practice Institute

Malicious Infrastructure Trends:

Telegram bot integrations seen through a purported malicious website (e.g., trumpversuselon.com) leveraged X (formerly Twitter) automation to redirect users to compose posts. Additionally, this particular domain was configured to leverage Telegram’s messaging API, either by auto-redirecting visitors or by presenting a Telegram bot interface. This functionality is achieved through client-side scripting (e.g., JavaScript) or meta-refresh tags, directing individuals to a specific Telegram handle or channel. This method is frequently observed in campaigns designed to funnel victims into fraudulent investment schemes, as the domain promotes crypto or facilitates impersonation-based scams.

Additionally, there were also themes based on users’ popular internet surfing preferences. For example, fake betting sites and phishing lures tied to online games and merchandise (e.g., elonvstrumpfight.com, elonvstrump.store, elongame.icu).

Abusive or reputational attack domains (e.g., elonsucksmydick.com, elonrip.com) were also observed to psychologically manipulate visitors, making them support one side of the conflict, depending on the website’s agenda. Such platforms often include calls-to-action, like signing up for a movement or providing sensitive personal details, which can compromise their identity.

Cyber Technology Insights : Mattermost Launches Enterprise Advanced for Multi-Domain Defense and Critical Infrastructure

Domain Breakdown & Threat Types

Crypto Scam Infrastructure

Threat TypeDomainNotesCrypto scamtrumpvselon.spaceFake Trump-vs-Elon event giveawaytrumpbilliondollar.comClaims Trump backing $1B giveawaytrump2mars.comExploits Musk’s Mars ambitionstrumpvselon.wtfURL suggests “shocking” feud contenttrumpvselon.liveHosted fake livestream countdowntrumpvsmusk.xyzHosted Musk impersonator walletelonxparty.siteMeme coin airdrop impersonating Muskelonvstrump.xyzLive wallet embeddedelonprivateaccess.com / .info / .onlineMimic Tesla private share saleelonrip.onlineUsed fake obituary as bait

Gaming & Engagement Lures

Threat TypeDomainNotesFake gameelonvstrumpfight.comHTML5 game redirect to betting pageFake mobile appelongame.icuPseudo Google Play page, scam downloadEngagement farmingelonvstrumpwars.fun

elonvstrump.fun

Meme tournament bracket voting

Reddit-style image votes

Betting & Merchandise

Threat TypeDomainNotesBettingtrumpelonbingo.comHosted a Trump-Elon ‘Bingo’ card wagerMerchandiseelonvstrump.storeShirt sales, unclear legitimacy

Disinformation / Reputation Abuse

Threat TypeDomainNotesAbuseelonsucksmydick.com

elonrip.com

Reputation defamation

Fake news site publishing false death

Bot Automation

Threat TypeDomainNotesTelegram bottrumpversuselon.comAuto-post crypto promo links

Tactical Observations

Based on PreCrime Labs’ observations, certain scams are event-driven, in which threat actors pivot rapidly from one theme to another as public attention surges and wanes. The most recent example we have analyzed is the current Trump/Musk feud, in which domain registrations immediately peaked as this event was gaining attention. The active content themes (images of Trump/Musk in crypto, gaming, and shopping contexts), along with domain names combined with “.xyz”, “.space”, “.wtf”, “.live”, and “.site” TLDs, are consistent indicators of suspicious activity in this campaign.

The presence of Telegram integrations and fake app stores used in this campaign represents a shift to multi-channel attack vectors. There is a strong potential that we will continue to see scams spreading to other popular social media platforms, where media consumption and redirection are high.

Conclusions

The Elon vs. Trump feud has become a fertile ground for opportunistic threat actors, with a range of scams exploiting the names and media coverage of both figures. As public interest in these figures continues, more weaponized domains will likely be registered.

This trend is a reminder of the importance of real-time monitoring of current events in domain threat intelligence and the need to act fast when trending news becomes a vector for cybercrime.

Cyber Technology Insights : AvePoint Launches New Advanced Security and Optimization Features to Elements Platform

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: prnewswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSecuring the Future: Bridging AI and Legacy Systems
Next Article Water Curse Unleashes Multi-Stage Malware via 76 GitHub Accounts
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026
Leave A Reply Cancel Reply

Latest Posts

Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed

April 16, 2026

Ransomware Ruler: The Payouts King Strikes Back

April 16, 2026

Critical Vulnerability: Allowing Remote Attackers to Impersonate Any User in Webex Services

April 16, 2026

Data Breach Exposes 13.5 Million Users’ Personal Information

April 16, 2026
Don't Miss

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

By Staff WriterApril 15, 2026

Top Highlights Sweden publicly links a pro-Russian group to a failed cyberattack on a heating…

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Capita Faces Data Breach in Civil Service Pension System
  • North Korea Hacks macOS Users’ Data with ClickFix
  • Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed
  • Ransomware Ruler: The Payouts King Strikes Back
  • Critical Vulnerability: Allowing Remote Attackers to Impersonate Any User in Webex Services
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Capita Faces Data Breach in Civil Service Pension System

April 16, 2026

North Korea Hacks macOS Users’ Data with ClickFix

April 16, 2026

Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed

April 16, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202521 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.