Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026

Maple Finance’s SYRUP Token Now Available on Revolut in UK and EU

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
Security

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft

February 16, 2026No Comments3 Mins Read

A new phishing campaign targeting major financial and technology firms has been uncovered by cybersecurity researchers.

SOCRadar dubbed the campaign Operation DoppelBrand and said it focused on Fortune 500 companies, including Wells Fargo and USAA, between December 2025 and January 2026, with infrastructure linked to earlier activity dating back to 2022.

The cybersecurity firm attributed the activity to a financially motivated threat actor known as GS7. 

The campaign, described in a new report published on February 16, relies on lookalike domains and cloned login portals that closely imitate legitimate banking, insurance and technology websites.

Victims are lured through phishing emails and redirected to counterfeit pages where credentials are harvested and transmitted to Telegram bots controlled by the attacker.

In many cases, the operation goes further, deploying remote management and monitoring tools to gain persistent access to compromised systems.

Infrastructure Built for Scale

SOCRadar identified more than 150 domains tied to the latest wave of activity, with nearly 200 additional domains showing similar characteristics. The infrastructure is highly automated, using rotating registrars such as Namecheap and OwnRegistrar, Cloudflare hosting and short-lived SSL certificates issued within hours of domain registration.

Common traits include:

  • Recently registered domains with one-year terms

  • Automated SSL certificates from Let’s Encrypt or Google Trust Services

  • Wildcard DNS records enabling rapid subdomain creation

  • Brand-specific subdomains mimicking banks, insurers and technology providers

Read more on phishing infrastructure and remote access tools: Over 500 Scattered Spider Phishing Domains Poised to Target Multiple Industries

The phishing pages replicate visual elements of legitimate sites, including logos, CSS styles and login form layouts. Some campaigns route victims through fake OneDrive interfaces before presenting spoofed banking portals.

See also  Crypto ATM Giant Discloses $3.7 Million Bitcoin Theft Following Cyberattack – Crypto News Bitcoin News

Once credentials are submitted, data including IP address, geolocation and device details are forwarded to a Telegram group, allowing the attacker to filter and prioritise targets.

Remote Access and Monetization

Beyond credential theft, GS7 deploys legitimate remote access software such as LogMeIn Resolve to establish unattended access. Installers are delivered as MSI files, often accompanied by small VBS loaders that handle privilege escalation, silent installation and cleanup.

Researchers said the attacker appears to act as an initial access broker, selling or transferring compromised accounts to affiliates. In a direct exchange with SOCRadar, the individual claiming to be GS7 reportedly stated they had been operating for around ten years and provided screenshots of phishing panels bearing their handle.

Financially, blockchain analysis of a wallet shared during the investigation showed roughly 0.28 BTC received, equivalent to between $25,000 and $32,000 depending on market price at the time.

The primary targets include major US financial institutions, investment firms and insurance providers, alongside global technology and healthcare brands. English-speaking markets, particularly the US and Western Europe, account for the bulk of observed activity.

The SOCRadar report concluded that the combination of brand impersonation, automated infrastructure and legitimate remote management tools makes Operation DoppelBrand both scalable and difficult to disrupt.

Source link

Brands Credential DoppelBrand Operation theft Trusted Weaponizes

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

Miner capitulation is back as bitcoin’s $70,000 price fails to cover $87,000 production costs

February 5, 2026

BlackRock spot bitcoin ETF approval could catapult BTC to $56,000 – Matrixport

October 19, 2023

Coinbase picks Ireland for its EU MiCA hub

October 21, 2023

Type above and press Enter to search. Press Esc to cancel.