What's Happening?
A new phishing campaign, named Operation DoppelBrand, has been identified by cybersecurity researchers at SOCRadar. This campaign targets major financial and technology firms, including Fortune 500 companies like Wells Fargo and USAA. The operation, active
between December 2025 and January 2026, uses lookalike domains and cloned login portals to mimic legitimate banking, insurance, and technology websites. Victims are lured through phishing emails to counterfeit pages where their credentials are harvested and sent to Telegram bots controlled by the attackers. The campaign also employs remote management and monitoring tools to maintain access to compromised systems. SOCRadar has linked this activity to a financially motivated threat actor known as GS7, who has been operating for around ten years.
Why It's Important?
The significance of Operation DoppelBrand lies in its potential impact on U.S. financial institutions and technology firms. By targeting these sectors, the campaign poses a threat to sensitive financial data and corporate information, which could lead to financial losses and reputational damage. The use of sophisticated techniques, such as brand impersonation and automated infrastructure, makes the campaign difficult to detect and disrupt. This highlights the need for enhanced cybersecurity measures and vigilance among organizations to protect against such threats. The campaign's ability to scale and its focus on high-value targets underscore the evolving nature of cyber threats and the importance of robust security protocols.









