Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting
文章描述了一个针对匈牙利CERT和其他机构的网络钓鱼活动,攻击者利用亚马逊S3托管钓鱼页面,并集成Cloudflare Turnstile以增强可信度。钓鱼链接预填受害者邮箱地址,并使用Logokit套件实时获取目标品牌标志和favicon。攻击者通过mettcoint.com收集凭证,并持续针对全球银行、物流等机构展开攻击。 2025-7-7 11:1:5 Author: cyble.com(查看原文) 阅读量:26 收藏

Key Takeaways

  • The initial phishing link we identified mimicked the Hungary CERT login page, with the victim’s email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission.
  • The phishing pages were hosted on Amazon S3 (AWS) to stay under the radar and increase credibility among potential victims.
  • The phishing pages integrate Cloudflare Turnstile to create a false sense of security and legitimacy, increasing the success rate of credential harvesting.
  • At the time of analysis, the domain harvesting victim credentials were active and had zero detections on VirusTotal.
  • Further investigation revealed this to be an ongoing campaign targeting Banking and Logistics firms, showing a global and diverse targeting strategy.
  • These phishing links were built using the Logokit phishing kit. The target logo was extracted from the victim’s email domain using Clearbit and Google Favicon.

Technical Analysis

Cyble Research and Intelligence Labs (CRIL) has identified a targeted phishing campaign link directed at the Government of Hungary. The campaign involved threat actors impersonating HunCERT, Hungary’s official Computer Emergency Response Team.

CRIL has identified the following phishing URLs being used in this campaign:

  • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/[email protected]
  • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/[email protected]

These phishing pages are hosted on Amazon Web Services (AWS) infrastructure, specifically using Amazon S3 buckets to appear trusted and stay under the radar.

The credential-harvesting phishing links were crafted using a legitimate HunCERT email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission (see Figure 1).

Cyble: Figure 1 – Phishing page targeting HunCERT
Figure 1 – Phishing page targeting HunCERT

The phishing page is designed to closely resemble a legitimate login portal, prompting users to enter their passwords. To increase credibility, it integrates Cloudflare Turnstile, a CAPTCHA alternative, to simulate human verification. This added layer of legitimacy may deceive users into believing the page is secure.

The victim’s credentials are being sent to mettcoint[.]com/js/error-200.php (see Figure 2).

Cyble: Figure 2 – Victim credentials being sent to mettcoint[.]com
Figure 2 – Victim credentials being sent to mettcoint[.]com

Lastly, the victim is presented with a fake error message that displays “Error Submitting form. Please try again” (See Figure 3).

Cyble:  Figure 3 – Fake error message
Figure 3 – Fake error message

Phishing page – Logokit relation

Upon analyzing the phishing page, we found that the phishing site uses Clearbit and Google S2 Favicon in the following method (see Figure 4).

  • The Clearbit Logo API is used to fetch the logo from the domain of the targeted organizations.
  • Google S2 Favicon is leveraged to retrieve the Favicon icon by extracting the domain from the email address in the URL.
Cyble: Figure 4 – Fetching logo using Clearbit and Favicon using the Google S2 API
Figure 4 – Fetching logo using Clearbit and Favicon using the Google S2 API

The LogoKit phishing kit, first identified in 2021, is characteristic of leveraging URLs embedded with the victim’s email address, identical layouts, and real-time logo fetching from services like Clearbit and Google’s favicon API.

LogoKit remains actively used in phishing campaigns because of its simplicity and automation. By automatically retrieving branding icons based on the URL’s domain, threat actors avoid the need to manually locate and update icons or logos within the phishing kit, making the process more scalable, convincing, and efficient.

Ongoing Phishing campaign

During our research, we were able to identify an open directory path in mettcoint[.]com containing several php files and attack elements (see Figure 5).

Cyble: 
Figure 5 – Open Directory on mettcoint.com
Figure 5 – Open Directory on mettcoint.com

One of the directories contained a phishing page impersonating the WeTransfer file-sharing portal – mettcoint[.]com/css/nk/index-822929.html (see Figure 6).

LogoKit
Figure 6 – Phishing URL impersonating WeTransfer

Upon clicking the “Access Files” option, the victim is presented with a login page where the user credentials are uploaded to “mettcoint[.]com/css/nk/error-404.php”.

OSINT intel also revealed the domain “mettcoint[.]com” has been used in other phishing attacks, indicating this to be a currently ongoing campaign. In addition to targeting HunCERT, this ongoing phishing campaign has also targeted multiple entities across different countries, impersonating Kina Bank in Papua New Guinea, the Catholic Church in the United States, and logistics companies in Saudi Arabia (See Figure 7).

LogoKit
Figure 7 – Phishing site targeting Kina Bank in Papua New Guinea

mettcoint[.]com was registered in October 2024 and has been actively leveraged in phishing campaigns since February 2025. Notably, the domain currently has zero detections on VirusTotal, allowing it to operate stealthily. As of this writing, the domain is still live and functional. Its ongoing availability and undetected status indicate that the phishing campaign is likely still active, with threat actors continuing to target victims on a global scale.

Conclusion

This ongoing phishing campaign, identified by Cyble Research and Intelligence Labs (CRIL), demonstrates how threat actors continue to refine their tactics by impersonating trusted entities like HunCERT, Kina Bank, and charitable organizations. By hosting phishing pages in cloud services such as Amazon S3 and Render and leveraging techniques like Cloudflare Turnstile, the attackers enhance the credibility of their phishing pages.

The human element remains both the strongest and weakest link in cybersecurity, with cautious and responsible use preventing compromises by cyber threats. Campaigns such as this, however, exploit that element by appearing credible, making them a primary concern for even cyber-savvy employees.

The ongoing use of the C&C domain mettcoint[.]com across multiple campaigns highlights a sustained, global operation. This case underscores the growing sophistication of phishing attacks and the need for constant vigilance, user awareness, and strong security controls to mitigate such threats.

Our Recommendations

The ideal way to avoid threats like this is to take a proactive stance instead of a reactive one. Dedicated Brand Intelligence solutions in CTI solutions, such as  Cyble Vision, specifically empower users with rapid takedowns by helping them avoid falling prey to phishing attacks or business email compromise, all relevant to the user’s brand, supply chain, and clients.  

Cyble Vision users can leverage the platform in the following ways:

  • Cyble Vision’s proprietary threat intelligence feeds proactively identify and block domains, IPs, and infrastructure components associated with this or any other tracked phishing campaign, ensuring rapid response and reduced exposure time.
  • Cyble’s deep and dark web reconnaissance capabilities keep you a step ahead by monitoring the proliferation of LogoKit-based phishing kits across underground forums and marketplaces, enabling early detection and disruption of similar threat campaigns.
  • Vision’s extensive Threat Actor library correlates attackers’ TTPs with profiles of threat actors tracked by Cyble, allowing for attribution, helping clients understand the broader context and motivation behind a campaign.

While there is no substitute for a competent CTI solution, we have listed some essential cybersecurity best practices that create the first line of control against attackers.

We recommend that our readers follow the best practices given below:

  • Be wary of opening any links received via SMS or emails delivered to your phone.
  • Use reputable anti-virus and internet security software on your connected devices, including your PC, laptop, and mobile device.
  • Educate employees on protecting themselves from threats like phishing/untrusted URLs.
  • Use secure email gateways to detect and block phishing emails with malicious links or attachments.
  • Use multi-factor authentication (MFA) to reduce the impact of stolen credentials.
  • Monitor for unusual login behavior or access from suspicious IP addresses.
  • Keep your devices, operating systems, and applications updated.

Indicators of Compromise (IOCs)

IndicatorsIndicator TypeDescription
flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html hxxps://chyplast[.]onrender.com/clastk-chy.html jstplastoss-bk.s3[.]us-east-2.amazonaws.com/z7WvKxGq4a9TnMf5Y2BpHJR6EL0udCXeNVwAQ8osIDU3bZymkgPtSjrh1FclXnOevYq29WRG45bTHVLuCMnAfKPZx0tdEJiSmgQUv7NAeO1XrYL3CHwbz5GKMpRtqsd9jo/auth-he-opas.html ecowhizz.co[.]za/ecowhizz.co.zaza/[email protected]URLPhishing URL
mettcoint[.]comURLC&C

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.


文章来源: https://cyble.com/blog/logokit-being-leveraged-for-credential-theft/
如有侵权请联系:admin#unsafe.sh