Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Last week in AI dev tools: Cloudflare blocking AI crawlers by default, Perplexity Max subscription, and more (July 7, 2025)

      July 7, 2025

      Infragistics Launches Ultimate 25.1 With Major Updates to App Builder, Ignite UI

      July 7, 2025

      Design Guidelines For Better Notifications UX

      July 7, 2025

      10 Top React.js Development Service Providers For Your Next Project In 2026

      July 7, 2025

      Following Microsoft’s mass layoffs, Xbox Game Pass’ business viability is again being questioned — is Xbox’s biggest differentiator an albatross?

      July 8, 2025

      A million customer conversations with AI agents yielded this surprising lesson

      July 7, 2025

      Bookworms: Don’t skip this Kindle Paperwhite Essentials bundle that’s on sale

      July 7, 2025

      My favorite “non-gaming” gaming accessory is down to its lowest price for Prime Day | XREAL’s AR glasses give you a virtual cinema screen for Xbox Cloud Gaming, Netflix, PC gaming handhelds, and more

      July 7, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Keyboard Testing in Accessibility Testing

      July 8, 2025
      Recent

      Keyboard Testing in Accessibility Testing

      July 8, 2025

      Implementation of Custom Tables in Optimizely Configured Commerce

      July 8, 2025

      Token Limit – Monitor token usage in AI context files

      July 7, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Following Microsoft’s mass layoffs, Xbox Game Pass’ business viability is again being questioned — is Xbox’s biggest differentiator an albatross?

      July 8, 2025
      Recent

      Following Microsoft’s mass layoffs, Xbox Game Pass’ business viability is again being questioned — is Xbox’s biggest differentiator an albatross?

      July 8, 2025

      dano – hashdeep/md5tree for media files

      July 8, 2025

      My favorite “non-gaming” gaming accessory is down to its lowest price for Prime Day | XREAL’s AR glasses give you a virtual cinema screen for Xbox Cloud Gaming, Netflix, PC gaming handhelds, and more

      July 7, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»LogoKit Phishing Kit Used in Government, Banking and Logistics Attacks: Cyble

    LogoKit Phishing Kit Used in Government, Banking and Logistics Attacks: Cyble

    July 7, 2025

    Fake login error message - LogoKit phishing attack

    Cyble threat intelligence researchers identified a phishing campaign aimed at Hungarian government targets that further investigation revealed was connected to wider global attack campaigns targeting the banking and logistics sectors.

    The initial phishing link discovered by the researchers led to a fake login page for HunCERT, Hungary’s Computer Emergency Response Team, Cyble said in a blog post today. The link prefilled the username field with the victim’s email address to increase the chances that the user would submit their credentials.

    The phishing links were built using the LogoKit phishing kit, Cyble determined. The phishing pages were hosted on Amazon S3 (AWS) “to stay under the radar and increase credibility among potential victims,” Cyble said. The pages also integrated Cloudflare Turnstile to further the sense of legitimacy.

    Those features may have helped the domain harvesting the credentials from being discovered, because the researchers found zero detections on VirusTotal during their work.

    LogoKit Phishing Kit Behind Multiple Attack Campaigns

    Cyble Research and Intelligence Labs (CRIL) researchers said the phishing URLs used in the campaign used a legitimate HunCERT email address prefilled in the username field.

    Cyble included two phishing URLs used in the campaign:

    • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html?email=cert@govcert.hu
    • flyplabtk[.]s3.us-east-2.amazonaws.com/q8T1vRzW3L7XpK0Mb9CfN6hJ2sUYgZAxewoQpHDVlt5BmnEjOrGiScFuYXdAv349/he-opas.html?email=csirt@nki.gov.hu

    The phishing page was designed “to closely resemble a legitimate login portal,” Cyble said, and the Cloudflare Turnstile verification “may deceive users into believing the page is secure” (image below).

    LogoKit phishing page targeting HunCERT
    Phishing page targeting HunCERT (Cyble)

    A fake error message then tells victims, “Error Submitting form. Please try again.”

    The phishing site uses the Clearbit Logo API to fetch the logo from the domain of the targeted organizations, Cyble said, and the Google S2 Favicon retrieves the Favicon icon by extracting the domain from the email address in the URL.

    The widely used LogoKit phishing kit leverages “URLs embedded with the victim’s email address, identical layouts, and real-time logo fetching from services like Clearbit and Google’s favicon API,” the researchers said.

    “LogoKit remains actively used in phishing campaigns because of its simplicity and automation,” Cyble said. “By automatically retrieving branding icons based on the URL’s domain, threat actors avoid the need to manually locate and update icons or logos within the phishing kit, making the process more scalable, convincing, and efficient.”

    Victim credentials are sent to mettcoint[.]com/js/error-200.php. The researchers found an open directory path in mettcoint[.]com that contained several php files and attack elements, and one of the directories contained a phishing page impersonating the WeTransfer file-sharing portal.

    OSINT intel revealed that the domain mettcoint[.]com has been used in other phishing attacks. Other targets in the ongoing phishing campaign have included Kina Bank in Papua New Guinea, the Catholic Church in the United States, and logistics companies in Saudi Arabia.

    mettcoint[.]com was registered in October 2024 and has been actively leveraged in phishing campaigns since February 2025, Cyble said.

    “Notably, the domain currently has zero detections on VirusTotal, allowing it to operate stealthily,” Cyble said. “As of this writing, the domain is still live and functional. Its ongoing availability and undetected status indicate that the phishing campaign is likely still active, with threat actors continuing to target victims on a global scale.”

    Protecting Against Phishing Attacks

    Cyble said the mettcoint phishing campaigns reveal a major weakness in cybersecurity defenses.

    “The human element remains both the strongest and weakest link in cybersecurity, with cautious and responsible use preventing compromises by cyber threats,” the researchers wrote. “Campaigns such as this, however, exploit that element by appearing credible, making them a primary concern for even cyber-savvy employees.”

    In addition to a threat intelligence solution that can automatically identify and block threats, Cyble said there are additional cybersecurity best practices that can help stop phishing attacks. Those practices include:

    • Being wary of links received via SMS or emails
    • Using good antivirus and internet security software on all connected devices
    • Educating employees on how to protect themselves from threats like phishing and untrusted URLs
    • Using secure email gateways to detect and block phishing emails with malicious links or attachments
    • Using multi-factor authentication (MFA) to limit exploitation of stolen credentials
    • Monitoring for unusual login behavior or access from suspicious IP addresses
    • Keeping devices, operating systems, and applications updated.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLearning to Route LLMs with Confidence Tokens
    Next Article Perficient Recognized by Leading Analyst Firm for Automotive and Mobility Expertise

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20694 – Intel Bluetooth Denial of Service Vulnerability

    July 8, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20693 – Intel Wireless LAN STA Driver Out-of-Bounds Read Information Disclosure Vulnerability

    July 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-4473 – WordPress Frontend Dashboard Plugin Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Perplexity joins high-powered, high-priced AI race – here’s everything ‘Max’ includes

    News & Updates

    Scoping, Hoisting and Temporal Dead Zone in JavaScript

    Development

    Cataclysm: Bright Nights is a roguelike with sci-fi elements

    Linux

    Highlights

    Why Adobe Firefly might be the only AI image tool that actually matters

    April 11, 2025

    If you’re using AI-generated images or plan to, there’s something you need to know now.…

    Insights in implementing production-ready solutions with generative AI

    April 30, 2025

    CVE-2025-5929 – WordPress Countdown Stored Cross-Site Scripting Vulnerability

    June 26, 2025

    50+ Model Context Protocol (MCP) Servers Worth Exploring

    June 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.