Back

Google Maps Hack Alters Names of Major Spanish Football Stadiums

Severity: Low (Score: 36.9)

Sources: Mirror, www.dailystar.co.uk

Published: 2026-05-21 · Updated: 2026-05-21

Keywords: madrid, barcelona, google, maps, real, stadiums, hackers

Severity indicators: rce

Summary

Hackers have tampered with the names of iconic football stadiums in Spain, including Real Madrid's Estadio Santiago Bernabeu and Barcelona's Spotify Camp Nou, on Google Maps. The alterations included humorous and derogatory names such as 'Mbappe Dictator' and 'Barcelona Training Ground.' The changes were not immediately visible, requiring users to zoom in to see the modified names. The cyberattacks are believed to have exploited security vulnerabilities or editing tools, but no group has claimed responsibility. Fans quickly shared screenshots of the altered names on social media. The incident follows a tumultuous season for Real Madrid, which recently dismissed their manager. The hack highlights ongoing issues within the clubs and the potential for cyber pranks to disrupt public perception. No specific CVEs or tools were mentioned in the articles. Key Points: • Hackers altered names of major Spanish football stadiums on Google Maps. • Altered names included derogatory references related to team performance. • No group has claimed responsibility for the cyber prank.

Detailed Analysis

**Impact** The incident affected major Spanish football clubs including Real Madrid, Barcelona, and Atletico Madrid by altering the names of their stadiums on Google Maps. The scope is limited to public-facing digital platforms, impacting brand reputation and fan experience primarily in Spain. No direct data breach or operational disruption was reported, and no sensitive or personal data appears to have been compromised. **Technical Details** Hackers exploited security vulnerabilities or editing tools within Google Maps to alter stadium names. The attack involved unauthorized changes visible after zooming in on the map, indicating manipulation of location metadata. No specific malware, CVEs, or threat actor groups were identified. The attack corresponds to the manipulation stage of the kill chain, leveraging platform editing features. **Recommended Response** Organizations should review and tighten access controls and editing permissions on third-party platforms like Google Maps. Google should investigate and patch any vulnerabilities in their map editing tools and monitor for unauthorized changes. Security teams should monitor social media and public platforms for similar defacements and implement alerts for unexpected metadata changes. No specific IOCs or patches were provided.

Source articles (2)

  • Hackers also dubbed the Bernabeu 'Barcelona Training Ground' — www.dailystar.co.uk · 2026-05-21
    Internet pranksters have been up to no good, playing with the names of Spain's most iconic football stadiums on Google Maps after a hack. La Liga giants Real Madrid, Barcelona and Atletico Madrid have…
  • Google Maps hackers target Barcelona and Real Madrid stadiums in brutal name change — Mirror · 2026-05-21
    Internet pranksters have been tampering with the names of Spain's most famous football stadiums on Google Maps following a hack. La Liga heavyweights Real Madrid , Barcelona and Atletico Madrid have a…

Timeline

  • 2026-05-21 — Stadium names altered on Google Maps: Hackers changed names of Real Madrid, Barcelona, and Atletico Madrid stadiums to humorous and derogatory terms. Fans shared screenshots on social media.
  • 2026-05-21 — Real Madrid dismisses manager Xabi Alonso: Real Madrid fired manager Xabi Alonso after a disappointing season, leading to unrest among players.

Related entities

  • Atletico Madrid (Company)
  • Barcelona (Company)
  • Real Madrid (Company)
  • Spain (Country)
  • Google Maps (Platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed