CoGUI Phish Kit Targets Japan with Millions of Messages
A sophisticated phishing kit named CoGUI is targeting Japanese organizations with high-volume campaigns, primarily impersonating consumer and finance brands to steal credentials and payment data. The kit employs advanced evasion techniques like geofencing and fingerprinting to avoid detection. Since October 2024, CoGUI campaigns have sent millions of messages monthly, peaking at 172 million in January 2025. While mainly focused on Japan, some campaigns have targeted other countries. The kit shares similarities with Darcula, another phishing framework used by Chinese-speaking actors. CoGUI's activity aligns with recent warnings from Japanese financial authorities about increased phishing attacks leading to financial theft.
AI Analysis
Technical Summary
The CoGUI phishing kit is a sophisticated and high-volume phishing framework primarily targeting Japanese organizations, with campaigns sending millions of messages monthly since October 2024 and peaking at 172 million messages in January 2025. This phishing kit impersonates well-known consumer and financial brands to deceive victims into divulging sensitive credentials and payment information. CoGUI employs advanced evasion techniques such as geofencing and device fingerprinting to avoid detection and limit exposure to unintended regions, which complicates defensive efforts. The kit shares technical and operational similarities with the Darcula phishing framework, historically linked to Chinese-speaking threat actors, suggesting a possible shared development lineage or actor overlap. Although the primary focus is Japan, some campaigns have extended to other countries, indicating potential for broader geographic impact. The timing and scale of CoGUI campaigns coincide with warnings from Japanese financial authorities about rising phishing attacks resulting in financial theft, underscoring the kit's operational effectiveness and threat to financial sector security. No known exploits or patches exist, as this is a phishing kit rather than a software vulnerability, and it relies on social engineering rather than technical exploitation. The threat is classified as medium severity, reflecting its high volume and sophistication but limited primarily to phishing and credential theft without direct system compromise or malware payloads.
Potential Impact
For European organizations, the direct impact of CoGUI is currently limited due to its primary targeting of Japanese entities and geofencing evasion techniques. However, the presence of campaigns targeting other countries indicates a risk of spillover or adaptation of the kit for European markets, especially in sectors with similar consumer and financial brand profiles. If adopted or modified for Europe, CoGUI could lead to significant credential and payment data theft, resulting in financial losses, reputational damage, and potential regulatory penalties under GDPR for compromised customer data. Financial institutions, e-commerce platforms, and consumer service providers in Europe could be particularly vulnerable if targeted. The use of advanced evasion techniques also suggests that traditional phishing detection mechanisms may be less effective, increasing the risk of successful attacks. Additionally, the connection to Chinese-speaking threat actors and the geopolitical context may influence targeting priorities, potentially affecting European countries with significant economic ties to Asia or those involved in geopolitical tensions. Overall, while the immediate threat to Europe is moderate, vigilance is warranted given the kit's scale and sophistication.
Mitigation Recommendations
European organizations should implement targeted anti-phishing defenses beyond generic advice. Specifically, they should deploy advanced email filtering solutions capable of detecting and blocking high-volume phishing campaigns that use brand impersonation and evasion techniques such as geofencing and fingerprinting. Incorporating machine learning models trained on phishing kit behavior and leveraging threat intelligence feeds that include CoGUI indicators can enhance detection. Organizations should conduct regular phishing simulation exercises tailored to mimic CoGUI-style attacks to improve user awareness and response. Multi-factor authentication (MFA) should be enforced on all critical systems to reduce the impact of credential theft. Financial institutions should monitor transaction anomalies closely to detect fraud resulting from stolen credentials. Collaboration with national cybersecurity agencies and sharing of phishing indicators can help track and mitigate emerging campaigns. Finally, organizations should review and harden their incident response plans to quickly contain and remediate phishing incidents involving credential compromise.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Belgium
Indicators of Compromise
- domain: etcady.xin
- domain: evrryday.com
- domain: uhlkg.cn
- domain: zjkso.cn
- domain: ezdrivema.com-kpy.win
- domain: kzongfd.bo5wfb0f9.top
- domain: sunpass.com-tyjr.cc
- url: https://zjkso.cn/QJSmxXOQ/
- url: https://uhlkg.cn/HJmOkggh
- url: https://kzongfd.bo5wfb0f9.top/Kfade
- url: https://evrryday.com/paypay-login-ne-jp
- url: https://ezdrivema.com-kpy.win/I/
- url: https://sunpass.com-tyjr.cc/pay/
- url: https://etcady.xin/pay/
- url: https://zjkso.cn/QJSmxXOQ/
- url: https://uhlkg.cn/HJmOkggh
- url: https://kzongfd.bo5wfb0f9.top/Kfade
- url: https://evrryday.com/paypay-login-ne-jp
- url: https://ezdrivema.com-kpy.win/I/
- url: https://sunpass.com-tyjr.cc/pay/
- url: https://etcady.xin/pay/
CoGUI Phish Kit Targets Japan with Millions of Messages
Description
A sophisticated phishing kit named CoGUI is targeting Japanese organizations with high-volume campaigns, primarily impersonating consumer and finance brands to steal credentials and payment data. The kit employs advanced evasion techniques like geofencing and fingerprinting to avoid detection. Since October 2024, CoGUI campaigns have sent millions of messages monthly, peaking at 172 million in January 2025. While mainly focused on Japan, some campaigns have targeted other countries. The kit shares similarities with Darcula, another phishing framework used by Chinese-speaking actors. CoGUI's activity aligns with recent warnings from Japanese financial authorities about increased phishing attacks leading to financial theft.
AI-Powered Analysis
Technical Analysis
The CoGUI phishing kit is a sophisticated and high-volume phishing framework primarily targeting Japanese organizations, with campaigns sending millions of messages monthly since October 2024 and peaking at 172 million messages in January 2025. This phishing kit impersonates well-known consumer and financial brands to deceive victims into divulging sensitive credentials and payment information. CoGUI employs advanced evasion techniques such as geofencing and device fingerprinting to avoid detection and limit exposure to unintended regions, which complicates defensive efforts. The kit shares technical and operational similarities with the Darcula phishing framework, historically linked to Chinese-speaking threat actors, suggesting a possible shared development lineage or actor overlap. Although the primary focus is Japan, some campaigns have extended to other countries, indicating potential for broader geographic impact. The timing and scale of CoGUI campaigns coincide with warnings from Japanese financial authorities about rising phishing attacks resulting in financial theft, underscoring the kit's operational effectiveness and threat to financial sector security. No known exploits or patches exist, as this is a phishing kit rather than a software vulnerability, and it relies on social engineering rather than technical exploitation. The threat is classified as medium severity, reflecting its high volume and sophistication but limited primarily to phishing and credential theft without direct system compromise or malware payloads.
Potential Impact
For European organizations, the direct impact of CoGUI is currently limited due to its primary targeting of Japanese entities and geofencing evasion techniques. However, the presence of campaigns targeting other countries indicates a risk of spillover or adaptation of the kit for European markets, especially in sectors with similar consumer and financial brand profiles. If adopted or modified for Europe, CoGUI could lead to significant credential and payment data theft, resulting in financial losses, reputational damage, and potential regulatory penalties under GDPR for compromised customer data. Financial institutions, e-commerce platforms, and consumer service providers in Europe could be particularly vulnerable if targeted. The use of advanced evasion techniques also suggests that traditional phishing detection mechanisms may be less effective, increasing the risk of successful attacks. Additionally, the connection to Chinese-speaking threat actors and the geopolitical context may influence targeting priorities, potentially affecting European countries with significant economic ties to Asia or those involved in geopolitical tensions. Overall, while the immediate threat to Europe is moderate, vigilance is warranted given the kit's scale and sophistication.
Mitigation Recommendations
European organizations should implement targeted anti-phishing defenses beyond generic advice. Specifically, they should deploy advanced email filtering solutions capable of detecting and blocking high-volume phishing campaigns that use brand impersonation and evasion techniques such as geofencing and fingerprinting. Incorporating machine learning models trained on phishing kit behavior and leveraging threat intelligence feeds that include CoGUI indicators can enhance detection. Organizations should conduct regular phishing simulation exercises tailored to mimic CoGUI-style attacks to improve user awareness and response. Multi-factor authentication (MFA) should be enforced on all critical systems to reduce the impact of credential theft. Financial institutions should monitor transaction anomalies closely to detect fraud resulting from stolen credentials. Collaboration with national cybersecurity agencies and sharing of phishing indicators can help track and mitigate emerging campaigns. Finally, organizations should review and harden their incident response plans to quickly contain and remediate phishing incidents involving credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/cogui-phish-kit-targets-japan-millions-messages"]
- Adversary
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainetcady.xin | — | |
domainevrryday.com | — | |
domainuhlkg.cn | — | |
domainzjkso.cn | — | |
domainezdrivema.com-kpy.win | — | |
domainkzongfd.bo5wfb0f9.top | — | |
domainsunpass.com-tyjr.cc | — |
Url
Value | Description | Copy |
---|---|---|
urlhttps://zjkso.cn/QJSmxXOQ/ | — | |
urlhttps://uhlkg.cn/HJmOkggh | — | |
urlhttps://kzongfd.bo5wfb0f9.top/Kfade | — | |
urlhttps://evrryday.com/paypay-login-ne-jp | — | |
urlhttps://ezdrivema.com-kpy.win/I/ | — | |
urlhttps://sunpass.com-tyjr.cc/pay/ | — | |
urlhttps://etcady.xin/pay/ | — | |
urlhttps://zjkso.cn/QJSmxXOQ/ | — | |
urlhttps://uhlkg.cn/HJmOkggh | — | |
urlhttps://kzongfd.bo5wfb0f9.top/Kfade | — | |
urlhttps://evrryday.com/paypay-login-ne-jp | — | |
urlhttps://ezdrivema.com-kpy.win/I/ | — | |
urlhttps://sunpass.com-tyjr.cc/pay/ | — | |
urlhttps://etcady.xin/pay/ | — |
Threat ID: 682c992c7960f6956616a085
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 5:49:50 PM
Last updated: 8/13/2025, 6:02:18 AM
Views: 23
Related Threats
A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
MediumPhantomCard: New NFC-driven Android malware emerging in Brazil
MediumThreatFox IOCs for 2025-08-13
MediumEfimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing
MediumSilent Watcher: Dissecting Cmimai Stealer's VBS Payload
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.