Over 2,000 user credentials stolen
A long-running and adaptive phishing campaign, dubbed "Operation HookedWing," has been systematically targeting organizations in critical sectors for over four years. A new report from threat intelligence firm SOCRadar reveals the campaign has compromised more than 500 organizations and stolen over 2,000 sets of user credentials. The operation demonstrates persistence and sophistication, evolving its infrastructure and lures over time to maintain effectiveness. The attackers have shown a strategic interest in high-value targets across aviation, government, energy, and finance, indicating a goal that may extend beyond simple credential theft to espionage or enabling more significant future attacks.
"Operation HookedWing" has been active since at least 2022, targeting a wide array of industries with high geopolitical significance. The campaign's primary objective is credential harvesting, specifically targeting Microsoft Outlook and other corporate login credentials.
The attackers' tactics, techniques, and procedures (TTPs) have evolved:
SOCRadar has identified two dozen command-and-control (C2) servers and over 100 GitHub domains associated with the campaign's infrastructure.
The attack chain for Operation HookedWing is a classic, yet effective, phishing flow:
T1566.002 - Phishing: Spearphishing Link.T1598.003 - Phishing for Information: Spearphishing via Service.The use of legitimate services like GitHub for hosting phishing kits is a common tactic (T1584.004 - Compromise Infrastructure: Web Services) to bypass security filters that block known-bad domains.
The theft of over 2,000 credentials from 500+ organizations in critical sectors has significant implications:
No specific technical Indicators of Compromise (IOCs) such as domains or IP addresses were provided in the summary articles.
*.github.io domains) could warrant investigation.D3-UT - User Training): Continuously train users to identify and report phishing emails. Emphasize skepticism towards urgent requests for credentials, even if they appear to come from an internal source.D3-MFA - Multi-factor Authentication): MFA is the single most effective defense against credential theft. Even if an attacker steals a password, they cannot access the account without the second factor.New technical details emerge for 'Operation HookedWing' phishing campaign, revealing custom phishing kits, dynamic C2 infrastructure, and use of Vercel for hosting malicious pages, alongside GitHub.io.
Further analysis of the 'Operation HookedWing' phishing campaign reveals advanced technical details. Threat actors utilize a custom phishing kit with dynamically loaded C2 server locations via external JavaScript, making detection more challenging. In addition to GitHub.io, the campaign leverages Vercel for hosting malicious landing pages. The phishing emails now impersonate Google alongside Microsoft, and the custom kit exfiltrates not only credentials but also the victim's IP address and detailed geolocation information using a PHP form. This indicates a highly sophisticated and adaptive threat actor, potentially acting as a credential or initial access broker.
Approximate start of the 'Operation HookedWing' phishing campaign.
SOCRadar publishes a report detailing the full scope of the campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.