What's Happening?
A broad phishing campaign, known as Operation Doppelbrand, has been targeting Fortune 500 companies, including Wells Fargo and USAA, from December 2025 to January 2026. The campaign, orchestrated by the threat actor GS7, involved over 150 domains impersonating
banking, technology, and insurance websites to harvest credentials and exfiltrate data via Telegram bots. Researchers from SOCRadar identified nearly 200 additional domains with automated SSL certificates and brand-specific subdomains. The attacks primarily targeted U.S. financial organizations, investment companies, and insurance firms, using legitimate remote monitoring and management tools to facilitate clandestine operations.
Why It's Important?
The Operation Doppelbrand campaign underscores the persistent threat of phishing attacks against major U.S. corporations, particularly in the financial sector. By impersonating well-known brands, attackers can deceive employees and customers, leading to significant data breaches and financial losses. This campaign highlights the need for robust cybersecurity measures and awareness training to protect against sophisticated phishing tactics. The financial and reputational impact on targeted companies can be severe, emphasizing the importance of proactive security strategies to safeguard sensitive information and maintain trust with stakeholders.









