Saturday, February 21, 2026

Operation DoppelBrand - The Phishing Campaign that Cloned 150 Fake Bank Domains

 


This week, cybersecurity researchers uncovered a large-scale phishing campaign targeting major financial brands — including Wells Fargo and USAA.


Dubbed Operation DoppelBrand by SOCRadar, the campaign is tied to a threat actor known as GS7. Attackers created more than 150 lookalike domains that cloned banking login pages nearly pixel-for-pixel.


Victims who clicked phishing emails had their credentials instantly forwarded to attacker-controlled Telegram bots.


Even more concerning? The group allegedly used legitimate remote management tools like LogMeIn Resolve to maintain access — and potentially resell it.


Phishing isn’t sloppy anymore. It’s automated. Scalable. Industrialized.


I’m Peter — bringing you Saturday Security Stories.


Like & Share.


https://socradar.io/blog/operation-doppelbrand-fortune-500-campaign/

No comments:

Post a Comment