Trending

Cyble: Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting

Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting

CRIL analyzes an ongoing LogoKit phishing campaign that pulls brand assets from Clearbit and Google Favicon.

Key Takeaways

  • The initial phishing link we identified mimicked the Hungary CERT login page, with the victim’s email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission.
  • The phishing pages were hosted on Amazon S3 (AWS) to stay under the radar and increase credibility among potential victims.
  • The phishing pages integrate Cloudflare Turnstile to create a false sense of security and legitimacy, increasing the success rate of credential harvesting.
  • At the time of analysis, the domain harvesting victim credentials were active and had zero detections on VirusTotal.
  • Further investigation revealed this to be an ongoing campaign targeting Banking and Logistics firms, showing a global and diverse targeting strategy.
  • These phishing links were built using the Logokit phishing kit. The target logo was extracted from the victim’s email domain using Clearbit and Google Favicon.

Technical Analysis

Cyble Research and Intelligence Labs (CRIL) has identified a targeted phishing campaign link directed at the Government of Hungary. The campaign involved threat actors impersonating HunCERT, Hungary’s official Computer Emergency Response Team.

CRIL has identified the following phishing URLs being used in this campaign:

  • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html?email=cert@govcert.hu
  • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html?email=csirt@nki.gov.hu

These phishing pages are hosted on Amazon Web Services (AWS) infrastructure, specifically using Amazon S3 buckets to appear trusted and stay under the radar.

The credential-harvesting phishing links were crafted using a legitimate HunCERT email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission (see Figure 1).

Cyble: Figure 1 – Phishing page targeting HunCERT
Figure 1 – Phishing page targeting HunCERT

The phishing page is designed to closely resemble a legitimate login portal, prompting users to enter their passwords. To increase credibility, it integrates Cloudflare Turnstile, a CAPTCHA alternative, to simulate human verification. This added layer of legitimacy may deceive users into believing the page is secure.

The victim’s credentials are being sent to mettcoint[.]com/js/error-200.php (see Figure 2).

report-ad-banner
Cyble: Figure 2 – Victim credentials being sent to mettcoint[.]com
Figure 2 – Victim credentials being sent to mettcoint[.]com

Lastly, the victim is presented with a fake error message that displays “Error Submitting form. Please try again” (See Figure 3).

Cyble:  Figure 3 – Fake error message
Figure 3 – Fake error message

Phishing page – Logokit relation

Upon analyzing the phishing page, we found that the phishing site uses Clearbit and Google S2 Favicon in the following method (see Figure 4).

  • The Clearbit Logo API is used to fetch the logo from the domain of the targeted organizations.
  • Google S2 Favicon is leveraged to retrieve the Favicon icon by extracting the domain from the email address in the URL.
Cyble: Figure 4 – Fetching logo using Clearbit and Favicon using the Google S2 API
Figure 4 – Fetching logo using Clearbit and Favicon using the Google S2 API

The LogoKit phishing kit, first identified in 2021, is characteristic of leveraging URLs embedded with the victim’s email address, identical layouts, and real-time logo fetching from services like Clearbit and Google’s favicon API.

LogoKit remains actively used in phishing campaigns because of its simplicity and automation. By automatically retrieving branding icons based on the URL’s domain, threat actors avoid the need to manually locate and update icons or logos within the phishing kit, making the process more scalable, convincing, and efficient.

Ongoing Phishing campaign

During our research, we were able to identify an open directory path in mettcoint[.]com containing several php files and attack elements (see Figure 5).

Cyble: 
Figure 5 – Open Directory on mettcoint.com
Figure 5 – Open Directory on mettcoint.com

One of the directories contained a phishing page impersonating the WeTransfer file-sharing portal – mettcoint[.]com/css/nk/index-822929.html (see Figure 6).

Figure 6 – Phishing URL impersonating WeTransfer

Upon clicking the “Access Files” option, the victim is presented with a login page where the user credentials are uploaded to “mettcoint[.]com/css/nk/error-404.php”.

OSINT intel also revealed the domain “mettcoint[.]com” has been used in other phishing attacks, indicating this to be a currently ongoing campaign. In addition to targeting HunCERT, this ongoing phishing campaign has also targeted multiple entities across different countries, impersonating Kina Bank in Papua New Guinea, the Catholic Church in the United States, and logistics companies in Saudi Arabia (See Figure 7).

Figure 7 – Phishing site targeting Kina Bank in Papua New Guinea

mettcoint[.]com was registered in October 2024 and has been actively leveraged in phishing campaigns since February 2025. Notably, the domain currently has zero detections on VirusTotal, allowing it to operate stealthily. As of this writing, the domain is still live and functional. Its ongoing availability and undetected status indicate that the phishing campaign is likely still active, with threat actors continuing to target victims on a global scale.

Conclusion

This ongoing phishing campaign, identified by Cyble Research and Intelligence Labs (CRIL), demonstrates how threat actors continue to refine their tactics by impersonating trusted entities like HunCERT, Kina Bank, and charitable organizations. By hosting phishing pages in cloud services such as Amazon S3 and Render and leveraging techniques like Cloudflare Turnstile, the attackers enhance the credibility of their phishing pages.

The human element remains both the strongest and weakest link in cybersecurity, with cautious and responsible use preventing compromises by cyber threats. Campaigns such as this, however, exploit that element by appearing credible, making them a primary concern for even cyber-savvy employees.

The ongoing use of the C&C domain mettcoint[.]com across multiple campaigns highlights a sustained, global operation. This case underscores the growing sophistication of phishing attacks and the need for constant vigilance, user awareness, and strong security controls to mitigate such threats.

Our Recommendations

The ideal way to avoid threats like this is to take a proactive stance instead of a reactive one. Dedicated Brand Intelligence solutions in CTI solutions, such as  Cyble Vision, specifically empower users with rapid takedowns by helping them avoid falling prey to phishing attacks or business email compromise, all relevant to the user’s brand, supply chain, and clients.  

Cyble Vision users can leverage the platform in the following ways:

  • Cyble Vision’s proprietary threat intelligence feeds proactively identify and block domains, IPs, and infrastructure components associated with this or any other tracked phishing campaign, ensuring rapid response and reduced exposure time.
  • Cyble’s deep and dark web reconnaissance capabilities keep you a step ahead by monitoring the proliferation of LogoKit-based phishing kits across underground forums and marketplaces, enabling early detection and disruption of similar threat campaigns.
  • Vision’s extensive Threat Actor library correlates attackers’ TTPs with profiles of threat actors tracked by Cyble, allowing for attribution, helping clients understand the broader context and motivation behind a campaign.

While there is no substitute for a competent CTI solution, we have listed some essential cybersecurity best practices that create the first line of control against attackers.

We recommend that our readers follow the best practices given below:

  • Be wary of opening any links received via SMS or emails delivered to your phone.
  • Use reputable anti-virus and internet security software on your connected devices, including your PC, laptop, and mobile device.
  • Educate employees on protecting themselves from threats like phishing/untrusted URLs.
  • Use secure email gateways to detect and block phishing emails with malicious links or attachments.
  • Use multi-factor authentication (MFA) to reduce the impact of stolen credentials.
  • Monitor for unusual login behavior or access from suspicious IP addresses.
  • Keep your devices, operating systems, and applications updated.

Indicators of Compromise (IOCs)

IndicatorsIndicator TypeDescription
flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html hxxps://chyplast[.]onrender.com/clastk-chy.html jstplastoss-bk.s3[.]us-east-2.amazonaws.com/z7WvKxGq4a9TnMf5Y2BpHJR6EL0udCXeNVwAQ8osIDU3bZymkgPtSjrh1FclXnOevYq29WRG45bTHVLuCMnAfKPZx0tdEJiSmgQUv7NAeO1XrYL3CHwbz5GKMpRtqsd9jo/auth-he-opas.html ecowhizz.co[.]za/ecowhizz.co.zaza/he-opas.html?email=ict.apnic@au.saabgroup.comURLPhishing URL
mettcoint[.]comURLC&C

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading