GS7 Threat Group Targets Fortune 500 Financial Institutions With Near-Perfect Brand Impersonation in Operation DoppelBrand

GS7 Threat Group Targets Fortune 500 Financial Institutions With Near-Perfect Brand Impersonation in Operation DoppelBrand

A financially motivated threat group tracked as GS7 has been running a large-scale phishing operation against Fortune 500 financial institutions, constructing near-perfect replicas of corporate login portals to harvest credentials and deploy remote access tools, according to research published by SOCRadar.

The campaign, dubbed Operation DoppelBrand, was first observed between December 2025 and January 2026, though SOCRadar's investigation indicates GS7 has been active since at least 2022.

Targets

Operation DoppelBrand targets major US financial institutions including Wells Fargo, USAA, Navy Federal Credit Union, Fidelity Investments, and Citibank. The campaign extends beyond finance into technology, healthcare, and telecommunications sectors, with a primary focus on English-speaking markets and expanding activity in Europe.

Infrastructure

GS7 registered more than 150 malicious domains in recent months using registrars including NameCheap and OwnRegistrar, routing traffic through Cloudflare to obscure backend servers. The phishing pages replicate official branding with high fidelity, making visual detection by victims extremely difficult.

The infrastructure is consistently rotated, demonstrating operational discipline designed to evade takedown efforts and domain blocklists.

Attack Chain

Harvested credentials — including usernames, passwords, IP addresses, geolocation data, device and browser fingerprints, and timestamps — are immediately exfiltrated to attacker-controlled Telegram bots. Researchers identified a Telegram group titled "NfResultz by GS" believed to be operated by the group.

Beyond credential theft, GS7 deploys remote management and monitoring (RMM) tools on victim systems to establish persistent remote access. A phishing demonstration provided by an individual claiming GS7 membership showed a Fidelity-impersonating portal that triggered RMM tool downloads upon login form completion.

Potential Initial Access Broker

SOCRadar assesses that GS7 may function as an initial access broker, selling compromised infrastructure access to ransomware groups or other affiliates. The researchers also uncovered links between GS7 and Brazilian cybercrime forums where stolen credentials and financial data are actively traded.

An individual claiming to represent GS7 told researchers the group has operated for nearly a decade, providing screenshots of phishing panels signed with the group's handle as evidence.

Recommendation

Financial institutions and Fortune 500 companies should review SOCRadar's whitepaper for the full IOC and TTP list associated with Operation DoppelBrand. Monitor for the identified malicious domains, enforce MFA across all customer-facing and employee login portals, and implement brand monitoring to detect impersonation domains early. Security teams should alert employees and customers to the campaign's high-fidelity phishing pages, which are difficult to distinguish visually from legitimate portals.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire