GS7 Threat Group Targets Fortune 500 Financial Institutions With Near-Perfect Brand Impersonation in Operation DoppelBrand
A financially motivated threat group tracked as GS7 has been running a large-scale phishing operation against Fortune 500 financial institutions, constructing near-perfect replicas of corporate login portals to harvest credentials and deploy remote access tools, according to research published by SOCRadar.
The campaign, dubbed Operation DoppelBrand, was first observed between December 2025 and January 2026, though SOCRadar's investigation indicates GS7 has been active since at least 2022.
Targets
Operation DoppelBrand targets major US financial institutions including Wells Fargo, USAA, Navy Federal Credit Union, Fidelity Investments, and Citibank. The campaign extends beyond finance into technology, healthcare, and telecommunications sectors, with a primary focus on English-speaking markets and expanding activity in Europe.
Infrastructure
GS7 registered more than 150 malicious domains in recent months using registrars including NameCheap and OwnRegistrar, routing traffic through Cloudflare to obscure backend servers. The phishing pages replicate official branding with high fidelity, making visual detection by victims extremely difficult.
The infrastructure is consistently rotated, demonstrating operational discipline designed to evade takedown efforts and domain blocklists.
Attack Chain
Harvested credentials — including usernames, passwords, IP addresses, geolocation data, device and browser fingerprints, and timestamps — are immediately exfiltrated to attacker-controlled Telegram bots. Researchers identified a Telegram group titled "NfResultz by GS" believed to be operated by the group.
Beyond credential theft, GS7 deploys remote management and monitoring (RMM) tools on victim systems to establish persistent remote access. A phishing demonstration provided by an individual claiming GS7 membership showed a Fidelity-impersonating portal that triggered RMM tool downloads upon login form completion.
Potential Initial Access Broker
SOCRadar assesses that GS7 may function as an initial access broker, selling compromised infrastructure access to ransomware groups or other affiliates. The researchers also uncovered links between GS7 and Brazilian cybercrime forums where stolen credentials and financial data are actively traded.
An individual claiming to represent GS7 told researchers the group has operated for nearly a decade, providing screenshots of phishing panels signed with the group's handle as evidence.
Recommendation
Financial institutions and Fortune 500 companies should review SOCRadar's whitepaper for the full IOC and TTP list associated with Operation DoppelBrand. Monitor for the identified malicious domains, enforce MFA across all customer-facing and employee login portals, and implement brand monitoring to detect impersonation domains early. Security teams should alert employees and customers to the campaign's high-fidelity phishing pages, which are difficult to distinguish visually from legitimate portals.