Over 500 Organizations Hit in Years-Long Phishing Campaign
Security WeekArchived May 11, 2026✓ Full text saved
Victims span across the aviation, critical infrastructure, energy, logistics, public administration, and technology sectors. The post Over 500 Organizations Hit in Years-Long Phishing Campaign appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
A phishing campaign that has been ongoing for more than four years has made hundreds of victims across multiple industries, SOCRadar reports.
Dubbed Operation HookedWing, the campaign was first documented in 2022 but has sustained activity and adapted its infrastructure while keeping core patterns largely unchanged.
Over the course of four years, more than 2,000 user credentials across over 500 organizations in the aviation and travel, critical infrastructure, energy, financial, government, logistics, public administration, and technology sectors were stolen as part of the campaign.
Between 2022 and 2024, Operation HookedWing used GitHub domains with English content and compromised servers as infrastructure, and the attacks mainly featured Microsoft and Outlook themes.
In 2024 and 2025, the threat actor expanded its targeting with French content, continuing to use GitHub, compromised servers, and previously observed phishing themes.
Starting in 2025, the threat actor has expanded both the active infrastructure and lures, obfuscating GitHub domain naming, adding more themes, and deploying additional landing pages.
SOCRadar identified two dozen command-and-control (C&C) servers associated with Operation HookedWing, as well as over 100 GitHub domains, and over a dozen distribution domains on other platforms.
“Analysis of recovered logs and identified infrastructure reveals a targeting pattern that is not random, as it focuses on infrastructure of high geopolitical relevance,” SOCRadar says.
“Victim selection suggests a particular interest in environments with access to sensitive information, critical operations, or high-privilege credentials that can be sold or used by other adversaries,” the company adds.
Operation HookedWing relies on phishing emails impersonating human resources or colleagues, or posing as notifications. The messages have a simple structure and are designed to convey authority and urgency without raising suspicion.
Many of the emails contain links to GitHub repositories, with some of them pointing to intermediaries hosted on other platforms. The landing pages simulate Microsoft Outlook behavior through a full-screen pre-loader and personalize the displayed text based on the victim organization.
“This introduces an important behavioral element. If the victim watches the loading screen, seeing their own organization name or something related to the previous email reinforces the credibility of the environment before the form appears,” SOCRadar notes.
In the meantime, a background script performs email and URL validation, injects a PHP form with pre-filled fields to collect the victims’ credentials, and retrieves geolocation data about the victim.
When the victim clicks the sign-in button on the page, the attacker “receives, in a single record, the email, password, IP address, full geolocation, source URL, and the victim organization domain”, SOCRadar explains.
Related: Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations
Related: New Bluekit Phishing Kit Features AI Assistant
Related: Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
Related: Security Firm Executive Targeted in Sophisticated Phishing Attack
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
Boost Security Raises $4 Million for SDLC Defense Platform
Chrome 148 Rolls Out With 127 Security Fixes
Vendor Says Daemon Tools Supply Chain Attack Contained
Cisco Patches High-Severity Vulnerabilities in Enterprise Products
Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack
Herd Security Raises $3 Million for AI-Powered Training Platform
Iranian APT Intrusion Masquerades as Chaos Ransomware Attack
Sophisticated Quasar Linux RAT Targets Software Developers
Latest News
In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
AI Firm Braintrust Prompts API Key Rotation After Data Breach
Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom
‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
Ransomware Group Takes Credit for Trellix Hack
Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover
Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
Trending
Webinar: ROSI For CPS Security Programs
May 13, 2026
In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Malwarebytes has named Chung Ip as Chief Financial Officer.
Semperis has appointed John Podboy as Chief Information Security Officer.
Randy Menon has become Chief Product and Marketing Officer at One Identity.
More People On The Move
Expert Insights
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
Flipboard
Reddit
Whatsapp
Email