Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Campaign Impacting Hundreds of Firms Uncovered

Phishing Campaign Impacting Hundreds of Firms Uncovered

Posted on May 11, 2026 By CWS

A sophisticated phishing operation lasting over four years has impacted hundreds of companies across various sectors, according to a report by cybersecurity firm SOCRadar. This operation, named Operation HookedWing, has continued to evolve since its initial documentation in 2022, maintaining core strategies while adapting its methods.

Widespread Impact and Stolen Credentials

Throughout its duration, Operation HookedWing has compromised more than 2,000 user credentials from over 500 organizations, affecting industries such as aviation, travel, energy, financial services, government, and technology. The campaign’s primary method involved using deceptive emails themed around Microsoft and Outlook, leveraging GitHub domains and compromised servers.

From 2024 onwards, the phishing group expanded its language targets to include French and continued to utilize GitHub for its malicious activities. They also diversified their attack methods by concealing domain names and adding new themes and landing pages to their tactics.

Infrastructure and Targeting Strategies

SOCRadar has identified numerous command-and-control (C&C) servers linked to Operation HookedWing, along with over 100 GitHub domains and several distribution domains on other platforms. The campaign’s targeting is strategic, focusing on infrastructures of significant geopolitical importance, suggesting an intent to access sensitive information and high-value credentials.

The phishing emails are crafted to mimic communications from HR departments or colleagues, using authoritative and urgent language to avoid suspicion. These emails often lead recipients to GitHub repositories or intermediary sites that mimic Microsoft Outlook, enhancing their credibility.

Technical Tactics and Data Collection

The phishing emails feature links that guide victims to landing pages simulating an Outlook environment, complete with personalized text based on the victim’s organization. A background script on these pages validates email addresses and URLs, and collects user credentials along with geolocation data.

Upon attempting to sign in, attackers gain access to a comprehensive set of data from the victim, including email, password, IP address, and organizational domain. This data is crucial for the attackers, providing them with valuable information that can be exploited or sold.

As phishing campaigns continue to evolve, organizations must remain vigilant and employ robust cybersecurity measures to protect against such threats. Continuous monitoring and education are key to mitigating the risks associated with these sophisticated cyber attacks.

Security Week News Tags:cyber attack, cyber crime, cyber threat, Cybersecurity, data breach, GitHub, Microsoft, Operation HookedWing, Outlook, Phishing, SOCRadar

Post navigation

Previous Post: Critical Ollama Security Flaw Exposes Memory Leak Risk
Next Post: Top Full Disk Encryption Tools for 2026

Related Posts

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  Security Week News
Silent Push Raises  Million for Threat Intelligence Platform Silent Push Raises $10 Million for Threat Intelligence Platform Security Week News
Keycard Emerges From Stealth Mode With  Million in Funding Keycard Emerges From Stealth Mode With $38 Million in Funding Security Week News
SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations Security Week News
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot ‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot Security Week News
Filigran Raises  Million in Series C Funding Filigran Raises $58 Million in Series C Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Interactive Malware Analysis Tools in 2026
  • Top Full Disk Encryption Tools for 2026
  • Phishing Campaign Impacting Hundreds of Firms Uncovered
  • Critical Ollama Security Flaw Exposes Memory Leak Risk
  • Urgent: cPanel and WHM Security Updates Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Interactive Malware Analysis Tools in 2026
  • Top Full Disk Encryption Tools for 2026
  • Phishing Campaign Impacting Hundreds of Firms Uncovered
  • Critical Ollama Security Flaw Exposes Memory Leak Risk
  • Urgent: cPanel and WHM Security Updates Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark