“Plus de 172 millions de messages” : mise en lumière de #CoGUI, exploité dans les campagnes de #phishing dont Amazon, PayPay ou encore Rakuten !
UrlScan article on Oriental Gudgeon seems to be on the same campaign than the Proofpoint article on CoGUI, cn domains are in both IoC lists.
https://www.proofpoint.com/us/blog/threat-insight/cogui-phish-kit-targets-japan-millions-messages
https://urlscan.io/blog/2025/05/06/oriental-gudgeon/
🚨 New threat research from Proofpoint 🚨
We have observed a notable increase in high-volume Japanese language campaigns targeting organizations in #Japan to deliver a phishing kit that Proofpoint researchers refer to as #CoGUI.
Most of the observed campaigns impersonate well-known companies, mainly consumer and finance brands, with the objective of stealing usernames, passwords and payment data.
CoGUI has some similarities to a phishing kit known as Darcula. Both are used by Chinese-speaking threat actors.
Notably, Proofpoint observed more finance-related #CoGUI campaigns in April 2025 following the reciprocal #tariff announcement by the U.S. government, and some CoGUI campaigns have used tariff-themed lures.
The CoGUI kit has several advanced defense evasion techniques. Proofpoint has created detections and Emerging Threats rules to combat this activity.
See our blog for full campaign details, examples, Emerging Threat detections and IOCs.