Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Facebook X (Twitter) Instagram
Sunday, February 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
News

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new phishing campaign targeting major financial and technology firms has been uncovered by cybersecurity researchers.

SOCRadar dubbed the campaign Operation DoppelBrand and said it focused on Fortune 500 companies, including Wells Fargo and USAA, between December 2025 and January 2026, with infrastructure linked to earlier activity dating back to 2022.

The cybersecurity firm attributed the activity to a financially motivated threat actor known as GS7. 

The campaign, described in a new report published on February 16, relies on lookalike domains and cloned login portals that closely imitate legitimate banking, insurance and technology websites.

Victims are lured through phishing emails and redirected to counterfeit pages where credentials are harvested and transmitted to Telegram bots controlled by the attacker.

In many cases, the operation goes further, deploying remote management and monitoring tools to gain persistent access to compromised systems.

Infrastructure Built for Scale

SOCRadar identified more than 150 domains tied to the latest wave of activity, with nearly 200 additional domains showing similar characteristics. The infrastructure is highly automated, using rotating registrars such as Namecheap and OwnRegistrar, Cloudflare hosting and short-lived SSL certificates issued within hours of domain registration.

Common traits include:

  • Recently registered domains with one-year terms

  • Automated SSL certificates from Let’s Encrypt or Google Trust Services

  • Wildcard DNS records enabling rapid subdomain creation

  • Brand-specific subdomains mimicking banks, insurers and technology providers

Read more on phishing infrastructure and remote access tools: Over 500 Scattered Spider Phishing Domains Poised to Target Multiple Industries

The phishing pages replicate visual elements of legitimate sites, including logos, CSS styles and login form layouts. Some campaigns route victims through fake OneDrive interfaces before presenting spoofed banking portals.

Once credentials are submitted, data including IP address, geolocation and device details are forwarded to a Telegram group, allowing the attacker to filter and prioritise targets.

Remote Access and Monetization

Beyond credential theft, GS7 deploys legitimate remote access software such as LogMeIn Resolve to establish unattended access. Installers are delivered as MSI files, often accompanied by small VBS loaders that handle privilege escalation, silent installation and cleanup.

Researchers said the attacker appears to act as an initial access broker, selling or transferring compromised accounts to affiliates. In a direct exchange with SOCRadar, the individual claiming to be GS7 reportedly stated they had been operating for around ten years and provided screenshots of phishing panels bearing their handle.

Financially, blockchain analysis of a wallet shared during the investigation showed roughly 0.28 BTC received, equivalent to between $25,000 and $32,000 depending on market price at the time.

The primary targets include major US financial institutions, investment firms and insurance providers, alongside global technology and healthcare brands. English-speaking markets, particularly the US and Western Europe, account for the bulk of observed activity.

The SOCRadar report concluded that the combination of brand impersonation, automated infrastructure and legitimate remote management tools makes Operation DoppelBrand both scalable and difficult to disrupt.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
Next Article SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Team-CWD
  • Website

Related Posts

News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026
News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026
News

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Children and chatbots: What parents should know

January 23, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.