Cyble Research and Intelligence Labs (CRIL) has identified a targeted phishing campaign link directed at the Government of Hungary. The campaign involved threat actors impersonating HunCERT, Hungary’s official Computer Emergency Response Team.
CRIL has identified the following phishing URLs being used in this campaign:
These phishing pages are hosted on Amazon Web Services (AWS) infrastructure, specifically using Amazon S3 buckets to appear trusted and stay under the radar.
The credential-harvesting phishing links were crafted using a legitimate HunCERT email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission (see Figure 1).
The phishing page is designed to closely resemble a legitimate login portal, prompting users to enter their passwords. To increase credibility, it integrates Cloudflare Turnstile, a CAPTCHA alternative, to simulate human verification. This added layer of legitimacy may deceive users into believing the page is secure.
The victim’s credentials are being sent to mettcoint[.]com/js/error-200.php (see Figure 2).
Lastly, the victim is presented with a fake error message that displays “Error Submitting form. Please try again” (See Figure 3).
Upon analyzing the phishing page, we found that the phishing site uses Clearbit and Google S2 Favicon in the following method (see Figure 4).
The LogoKit phishing kit, first identified in 2021, is characteristic of leveraging URLs embedded with the victim’s email address, identical layouts, and real-time logo fetching from services like Clearbit and Google’s favicon API.
LogoKit remains actively used in phishing campaigns because of its simplicity and automation. By automatically retrieving branding icons based on the URL’s domain, threat actors avoid the need to manually locate and update icons or logos within the phishing kit, making the process more scalable, convincing, and efficient.
During our research, we were able to identify an open directory path in mettcoint[.]com containing several php files and attack elements (see Figure 5).
One of the directories contained a phishing page impersonating the WeTransfer file-sharing portal – mettcoint[.]com/css/nk/index-822929.html (see Figure 6).
Upon clicking the “Access Files” option, the victim is presented with a login page where the user credentials are uploaded to “mettcoint[.]com/css/nk/error-404.php”.
OSINT intel also revealed the domain “mettcoint[.]com” has been used in other phishing attacks, indicating this to be a currently ongoing campaign. In addition to targeting HunCERT, this ongoing phishing campaign has also targeted multiple entities across different countries, impersonating Kina Bank in Papua New Guinea, the Catholic Church in the United States, and logistics companies in Saudi Arabia (See Figure 7).
mettcoint[.]com was registered in October 2024 and has been actively leveraged in phishing campaigns since February 2025. Notably, the domain currently has zero detections on VirusTotal, allowing it to operate stealthily. As of this writing, the domain is still live and functional. Its ongoing availability and undetected status indicate that the phishing campaign is likely still active, with threat actors continuing to target victims on a global scale.
This ongoing phishing campaign, identified by Cyble Research and Intelligence Labs (CRIL), demonstrates how threat actors continue to refine their tactics by impersonating trusted entities like HunCERT, Kina Bank, and charitable organizations. By hosting phishing pages in cloud services such as Amazon S3 and Render and leveraging techniques like Cloudflare Turnstile, the attackers enhance the credibility of their phishing pages.
The human element remains both the strongest and weakest link in cybersecurity, with cautious and responsible use preventing compromises by cyber threats. Campaigns such as this, however, exploit that element by appearing credible, making them a primary concern for even cyber-savvy employees.
The ongoing use of the C&C domain mettcoint[.]com across multiple campaigns highlights a sustained, global operation. This case underscores the growing sophistication of phishing attacks and the need for constant vigilance, user awareness, and strong security controls to mitigate such threats.
The ideal way to avoid threats like this is to take a proactive stance instead of a reactive one. Dedicated Brand Intelligence solutions in CTI solutions, such as Cyble Vision, specifically empower users with rapid takedowns by helping them avoid falling prey to phishing attacks or business email compromise, all relevant to the user’s brand, supply chain, and clients.
Cyble Vision users can leverage the platform in the following ways:
While there is no substitute for a competent CTI solution, we have listed some essential cybersecurity best practices that create the first line of control against attackers.
We recommend that our readers follow the best practices given below:
Indicators | Indicator Type | Description |
flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html hxxps://chyplast[.]onrender.com/clastk-chy.html jstplastoss-bk.s3[.]us-east-2.amazonaws.com/z7WvKxGq4a9TnMf5Y2BpHJR6EL0udCXeNVwAQ8osIDU3bZymkgPtSjrh1FclXnOevYq29WRG45bTHVLuCMnAfKPZx0tdEJiSmgQUv7NAeO1XrYL3CHwbz5GKMpRtqsd9jo/auth-he-opas.html ecowhizz.co[.]za/ecowhizz.co.zaza/[email protected] | URL | Phishing URL |
mettcoint[.]com | URL | C&C |
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.