LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

Cybercrime Intelligence

phishing kit, open redirect, vulnerability

LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company providing managed threat detection and response for Fortune 500's, identified threat actors leveraging Open Redirect Vulnerabilities popular in online services and apps to bypass spam filters to ultimately deliver phishing content.

Using highly trusted service domains like Snapchat and other online-services, they create special URLs which lead to malicious resources with phishing kits. The kit identified is named LogoKit, which was previously used in attacks against the customers of Office 365, Bank of America, GoDaddy, Virgin Fly, and many other major financial institutions and online-services internationally.

The spike of LogoKit was been identified around the beginning of August, when multiple new domain names impersonating popular services had been registered and leveraged together with Open Redirects. While LogoKit is known for a while in the underground, at least since 2015, the cybercrime group behind it is constantly leveraging new tactics.

LogoKit is known for its dynamic content generation using JavaScript – it is able to change logos (of the impersonated service) and text on the landing pages in real-time to adapt on the fly, by doing so the targeted victims are more likely to interact with the malicious resource. Around November 2021, there were over 700 identified domains names used in campaigns leveraging LogoKit – their number is constantly growing.

Notably, the actors prefer to use domain names in exotic jurisdictions or zones with relatively poor abuse management process - .gq, .ml, .tk, ga, .cf or to gain unauthorized access to legitimate WEB-resources, and then use them as hosting for further phishing distribution.

LogoKit relies on sending users phishing links that contain their email addresses. Once the victim navigates to the URL, LogoKit fetches the company logo from a third-party service, such as Clearbit or Google's favicon database. The victim’s email is then auto filled in the email or username field which consequently tricks them into feeling they’ve previously logged in before. Should the victim then enter their password, LogoKit performs an AJAX request, sending the target's email and password to an external source, then finally redirecting the victim to their “legitimate” corporate website.

These tactics allow cybercriminals to masquerade their activity behind the notifications of legitimate services to evade detection, thus tricking the victim into accessing the malicious resource. Unfortunately, the use of Open Redirect vulnerabilities significantly facilitates LogoKit distribution, as many (even popular) online-services don’t treat such bugs as critical, and in some cases – don’t even patch, leaving the open door for such abuse.

Let’s take a closer look at how it works on the example of the campaign identified in July 13th, it was targeting Office 365 users from the U.S. and Latin America:

phishing email credentials victim url

This is an example of an email containing text and a link with an embedded link inside it

link inside malicious email phishing logokit

The embedded link is leveraging Open Redirect Vulnerability in Snapchat, and another URL from Google leading to a phishing resource:


Notably, some of the observed anti-spam mechanisms don’t flag such links as malicious scoring them as trusted.

Once we decoded it, we found another link which contains the email address of the victim in question:


The attacker used the Open Redirect in Snapchat to redirect the victim to new URL[.]do

click snapchat vhg redirection

snapchat phishing malicious link application

The content of the pages generated by LogoKit is typically obfuscated.


base64 private property malicious code snapchat

Here you can see the code that deals with the Base64 portion of the attack.

redirection link response analysis

And here is the redirection part.

base64 encode redirect decode malicious link

The final page is leading to phishing impersonating Microsoft Office 365:

phishing impersonating microsoft office 365

Numerous others were identified with A records leveraging exactly the same domains:

Initially, multiple victims received phishing links from compromised emails registered at GMX:


Password Notification Wednesday, July 13, 2022 8:18:26 PM

Message Id


Creation time

Wed, 13 Jul 2022 20:18:26 +0000 (Delivered after 6 seconds)


"Service Request" <>



Notably, the actors are using hacked WEB-resources leveraging the access to them for placing phishing without owners knowledge:

domain information parqiedelprado midominio banahosting

And here we can see how the attacker was using the fleek service to host their malicious code.

domain information fleek 1api gmbh cloudflare GB

LogoKit have already been identified on more than 300 domains which took place over the past week, and more than 700 sites over the past month.

Some examples of various templates leveraged by LogoKit:

- Bank of America

bank of america boa adobe pdf email phishing kit

- Virgin Fly

virgin fly phishing kit landing page malicious

- Office 365

office365 microsoft malicious phishing kit landing page

- GoDaddy

godaddy phishing kit malicious landing page

- Firebase

firebase malicious phishing kit landing page




storageapi.fleek[.]co/0ad91b1c-9994-4a1d-bf88-18cf07dbaf52-bucket/continue.html?#(emailaddress) #(emailaddress) URL(http): / #(emailaddress)

web[.]app, csb[.]app






Keep up to date with the latest cybersecurity news and developments.

By subscribing, I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy

Cloud Architecture
Cloud Architecture
445 S. Figueroa Street
Los Angeles, CA 90071
Google Maps
Contact us by filling out the form.
Try Resecurity products today with a free trial