Operation DoppelBrand: Sophisticated Phishing Campaign Exploits Trusted Brands

Related

New “Starkiller” Phishing Kit Poses MFA Bypass Risk to Enterprises

What happened Security researchers have uncovered a new phishing-as-a-service (PhaaS)...

Android Malware PromptSpy Leverages AI for Persistent Attacks

What happened Security researchers at ESET have identified PromptSpy, the...

Crypto Scam Campaign Exploits Malvertising and Social Engineering Across Asia

What happened A sophisticated cryptocurrency scam operation is actively targeting...

Share

What happened

A financially motivated threat actor known as GS7 has launched an ongoing phishing campaign, dubbed Operation DoppelBrand, that weaponizes near‑perfect imitations of Fortune 500 corporate portals to harvest credentials and gain remote access to systems.

Who is affected

Top U.S. financial institutions and other high‑value enterprises, including Wells Fargo, USAA, Navy Federal Credit Union, Fidelity Investments, and Citibank, along with firms in technology, healthcare, and telecommunications across English‑speaking markets and beyond have been targeted.

Why CISOs should care

Operation DoppelBrand demonstrates a rising trend in highly automated, brand‑impersonation phishing infrastructure capable not only of capturing employee credentials but also of deploying legitimate remote management and monitoring tools to establish persistent access, potentially enabling lateral movement, malware deployment, or sale of access to other threat actors. 

3 practical actions

  1. Enhance phishing defenses and detection: Deploy advanced email filtering, domain monitoring for lookalike sites, and user reporting tools to reduce successful phishing attempts.
  2. Strengthen authentication practices: Enforce multi‑factor authentication (MFA) and continuous monitoring of privileged access to limit the value of stolen credentials.
  3. Harden remote access policy: Review and restrict the use of remote management tools, enforce least‑privilege, and implement robust endpoint and network segmentation to contain potential breaches.