Over 500 Organizations Hit in Years-Long Phishing Campaign
Briefly

Over 500 Organizations Hit in Years-Long Phishing Campaign
"A phishing campaign that has been ongoing for more than four years has made hundreds of victims across multiple industries, SOCRadar reports. Dubbed Operation HookedWing, the campaign was first documented in 2022 but has sustained activity and adapted its infrastructure while keeping core patterns largely unchanged. Over the course of four years, more than 2,000 user credentials across over 500 organizations in the aviation and travel, critical infrastructure, energy, financial, government, logistics, public administration, and technology sectors were stolen as part of the campaign."
"Between 2022 and 2024, Operation HookedWing used GitHub domains with English content and compromised servers as infrastructure, and the attacks mainly featured Microsoft and Outlook themes. In 2024 and 2025, the threat actor expanded its targeting with French content, continuing to use GitHub, compromised servers, and previously observed phishing themes. Starting in 2025, the threat actor has expanded both the active infrastructure and lures, obfuscating GitHub domain naming, adding more themes, and deploying additional landing pages."
"SOCRadar identified two dozen command-and-control (C&C) servers associated with Operation HookedWing, as well as over 100 GitHub domains, and over a dozen distribution domains on other platforms. "Analysis of recovered logs and identified infrastructure reveals a targeting pattern that is not random, as it focuses on infrastructure of high geopolitical relevance," SOCRadar says. "Victim selection suggests a particular interest in environments with access to sensitive information, critical operations, or high-privilege credentials that can be sold or used by other adversaries," the company adds."
"Operation HookedWing relies on phishing emails impersonating human resources or colleagues, or posing as notifications. The messages have a simple structure and are designed to convey authority and u"
Operation HookedWing is a phishing campaign active for more than four years, with activity documented in 2022 and continued through 2024 and 2025. The campaign has stolen more than 2,000 user credentials from over 500 organizations across aviation and travel, critical infrastructure, energy, financial services, government, logistics, public administration, and technology. Between 2022 and 2024, it used GitHub domains with English content and compromised servers, with phishing themes centered on Microsoft and Outlook. In 2024 and 2025, it expanded targeting with French content while continuing to use GitHub domains, compromised servers, and previously observed themes. In 2025, it expanded infrastructure and lures by obfuscating GitHub domain naming, adding more themes, and deploying additional landing pages. It uses phishing emails impersonating human resources or colleagues or sending notification-style messages, and SOCRadar identified multiple command-and-control servers and many related domains.
Read at SecurityWeek
Unable to calculate read time
[
|
]