[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fxHhKKO_lwlkIg4ZNfN6xI8QJakO6L0vTP4LShVt3LBM":3},{"article":4,"iocs":51},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":30,"category":31,"article_tags":35},"7e1c0be9-86b4-407f-93f9-c0c1b905db21","Over 500 Organizations Hit in Years-Long Phishing Campaign","over-500-organizations-hit-in-years-long-phishing-campaign-6a0646","Victims span across the aviation, critical infrastructure, energy, logistics, public administration, and technology sectors. The post Over 500 Organizations Hit in Years-Long Phishing Campaign appeared first on SecurityWeek.","SOCRadar has documented Operation HookedWing, a sophisticated phishing campaign active since 2022 that has compromised over 500 organizations across aviation, critical infrastructure, energy, government, logistics, and technology sectors, stealing more than 2,000 user credentials. The campaign uses GitHub repositories and compromised servers to host personalized phishing pages mimicking Microsoft Outlook, with infrastructure expanding and tactics evolving in 2024–2025 to include French-language lures and obfuscated domains. Analysis suggests geopolitical targeting focused on high-privilege credentials and sensitive-access environments, indicating potential nation-state involvement or targeting of strategic interest.","Operation HookedWing phishing campaign steals 2,000+ credentials from 500+ organizations over four years.","A phishing campaign that has been ongoing for more than four years has made hundreds of victims across multiple industries, SOCRadar reports. Dubbed Operation HookedWing, the campaign was first documented in 2022 but has sustained activity and adapted its infrastructure while keeping core patterns largely unchanged. Over the course of four years, more than 2,000 user credentials across over 500 organizations in the aviation and travel, critical infrastructure, energy, financial, government, logistics, public administration, and technology sectors were stolen as part of the campaign. Between 2022 and 2024, Operation HookedWing used GitHub domains with English content and compromised servers as infrastructure, and the attacks mainly featured Microsoft and Outlook themes. In 2024 and 2025, the threat actor expanded its targeting with French content, continuing to use GitHub, compromised servers, and previously observed phishing themes. Starting in 2025, the threat actor has expanded both the active infrastructure and lures, obfuscating GitHub domain naming, adding more themes, and deploying additional landing pages.Advertisement. Scroll to continue reading. SOCRadar identified two dozen command-and-control (C&C) servers associated with Operation HookedWing, as well as over 100 GitHub domains, and over a dozen distribution domains on other platforms. “Analysis of recovered logs and identified infrastructure reveals a targeting pattern that is not random, as it focuses on infrastructure of high geopolitical relevance,” SOCRadar says. “Victim selection suggests a particular interest in environments with access to sensitive information, critical operations, or high-privilege credentials that can be sold or used by other adversaries,” the company adds. Operation HookedWing relies on phishing emails impersonating human resources or colleagues, or posing as notifications. The messages have a simple structure and are designed to convey authority and urgency without raising suspicion. Many of the emails contain links to GitHub repositories, with some of them pointing to intermediaries hosted on other platforms. The landing pages simulate Microsoft Outlook behavior through a full-screen pre-loader and personalize the displayed text based on the victim organization. “This introduces an important behavioral element. If the victim watches the loading screen, seeing their own organization name or something related to the previous email reinforces the credibility of the environment before the form appears,” SOCRadar notes. In the meantime, a background script performs email and URL validation, injects a PHP form with pre-filled fields to collect the victims’ credentials, and retrieves geolocation data about the victim. When the victim clicks the sign-in button on the page, the attacker “receives, in a single record, the email, password, IP address, full geolocation, source URL, and the victim organization domain”, SOCRadar explains. Related: Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations Related: New Bluekit Phishing Kit Features AI Assistant Related: Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks Related: Security Firm Executive Targeted in Sophisticated Phishing Attack Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Boost Security Raises $4 Million for SDLC Defense PlatformChrome 148 Rolls Out With 127 Security FixesVendor Says Daemon Tools Supply Chain Attack ContainedCisco Patches High-Severity Vulnerabilities in Enterprise ProductsGemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackHerd Security Raises $3 Million for AI-Powered Training PlatformIranian APT Intrusion Masquerades as Chaos Ransomware AttackSophisticated Quasar Linux RAT Targets Software Developers Latest News In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerPolish Security Agency Reports ICS Breaches at Five Water Treatment PlantsAI Firm Braintrust Prompts API Key Rotation After Data BreachCyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom‘PCPJack’ Worm Removes TeamPCP Infections, Steals CredentialsRansomware Group Takes Credit for Trellix HackVulnerability in Claude Extension for Chrome Exposes AI Agent to TakeoverIvanti Patches EPMM Zero-Day Exploited in Targeted Attacks Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fover-500-organizations-hit-in-years-long-phishing-campaign\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2025\u002F11\u002FAI-phishing.jpeg","2026-05-11T03:49:18+00:00","2026-05-11T04:00:19.858426+00:00",9,[18,21,24,27],{"name":19,"type":20},"Operation HookedWing","campaign",{"name":22,"type":23},"Microsoft Outlook","product",{"name":25,"type":26},"GitHub","technology",{"name":28,"type":29},"SOCRadar","vendor","e7b231c8-5f79-4465-8d38-1ef13aea5a14",{"id":30,"icon":32,"name":33,"slug":34},null,"Threat Intelligence","threat-intelligence",[36,41,46],{"category":37},{"id":38,"icon":32,"name":39,"slug":40},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":42},{"id":43,"icon":32,"name":44,"slug":45},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":47},{"id":48,"icon":32,"name":49,"slug":50},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",[52],{"type":50,"value":53,"context":54},"Operation HookedWing phishing kit","Phishing infrastructure using GitHub domains, compromised servers, and Outlook-themed landing pages"]