Skip to content
.ca
5 minhigh

Meet Bluekit: The AI-Powered All-in-One Phishing Kit

Varonis Threat Labs analyzed Bluekit, a comprehensive Phishing-as-a-Service platform that consolidates domain management, site creation, credential harvesting, and session token theft into a single dashboard. Notably, the kit integrates an AI Assistant powered by uncensored LLMs to draft phishing lures and features advanced post-login session hijacking capabilities, including automated cookie dumping and live target monitoring to bypass standard MFA controls.

Conf:highAnalyzed:2026-04-29reports

Authors: Varonis Threat Labs

ActorsBluekit operators

Source:Varonis

IOCs · 2
  • domain
    bluekit[.]pkPrimary domain associated with the Bluekit PhaaS panel, observed in dashboard screenshots.
  • domain
    demo[.]bluekit[.]pkSubdomain used for site creation and demonstration within the Bluekit panel.

Detection / Hunter

What Happened

Security researchers have discovered a new, all-in-one phishing tool called Bluekit that makes it easier for cybercriminals to launch attacks. This tool provides everything a hacker needs in one place, including fake website templates for popular services like Microsoft, Google, and Apple, as well as an AI assistant to help write convincing scam emails. It is particularly dangerous because it can steal not just passwords, but also the special 'session cookies' used to bypass two-factor authentication. Organizations should ensure they are using strong, phishing-resistant authentication methods like security keys and train employees to recognize sophisticated email lures.

Key Takeaways

  • Bluekit is a comprehensive Phishing-as-a-Service (PhaaS) platform offering 40+ templates, automated domain management, and built-in evasion tools.
  • The kit features an integrated AI Assistant utilizing uncensored models (like an abliterated Llama 3 70B) to generate phishing campaign drafts and lures.
  • Post-compromise capabilities include session state tracking, live screen viewing, and automated dumping of cookies and local storage to bypass MFA.
  • Bluekit centralizes operations, using Telegram as the default exfiltration channel for captured credentials and session tokens.
  • The platform is in active development, frequently adding new templates (e.g., Gmail passkey) and evasion features to block security scanners.

Affected Systems

  • Microsoft 365
  • Google Workspace
  • Apple iCloud
  • GitHub
  • ProtonMail
  • Various consumer and enterprise web services

Attack Chain

Operators purchase or connect domains directly within the Bluekit panel and select a target template (e.g., Microsoft 365, Gmail). The kit deploys a phishing page with built-in anti-analysis controls to block proxies, VPNs, and headless browsers. When a victim interacts with the page, Bluekit captures their credentials and uses a reverse-proxy or similar mechanism to handle the post-login session, dumping cookies and local storage every 30 seconds. The stolen data and session tokens are then exfiltrated to the operator, typically via a configured Telegram bot.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

The article does not provide specific detection rules or queries.

Detection Engineering Assessment

EDR Visibility: Low — This is primarily a web-based threat targeting cloud identities and session tokens; EDR on the endpoint has limited visibility into the phishing infrastructure itself, though it might see the initial email or link click. Network Visibility: Medium — Network tools can detect connections to known bad domains or anomalous traffic patterns associated with reverse-proxy phishing, but HTTPS encrypts the payload. Detection Difficulty: Moderate — Detecting the infrastructure requires robust threat intelligence and analyzing identity logs for impossible travel or anomalous session cookie usage, as the kit actively blocks automated scanners and headless browsers.

Required Log Sources

  • Web Proxy Logs
  • DNS Logs
  • Cloud Identity Provider Logs (Azure AD, Google Workspace)
  • Email Gateway Logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for anomalous session cookie usage where a session token is suddenly used from a new, unrecognized IP address or ASN shortly after initial authentication, indicating potential session hijacking via tools like Bluekit.Cloud IdP LogsCredential AccessMedium
Search for inbound emails containing QR codes (quishing) combined with urgent lures related to MFA re-verification or executive themes.Email Gateway LogsInitial AccessLow

Control Gaps

  • Standard MFA (SMS/Push) is vulnerable to session token theft via reverse-proxy phishing.
  • Automated web scanners and threat intel crawlers may be blocked by the kit's anti-headless and anti-proxy filters.

Key Behavioral Indicators

  • Rapid sequence of login followed by immediate session token extraction.
  • Connections to newly registered domains with Let's Encrypt certificates used for cloud service logins.

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Block known Bluekit domains (e.g., bluekit.pk) at the network perimeter and DNS level.
  • Search email gateways for recent campaigns utilizing QR codes for MFA re-verification.

Infrastructure Hardening

  • Implement Phishing-Resistant MFA (e.g., FIDO2/WebAuthn security keys) to mitigate the risk of reverse-proxy credential harvesting and session theft.
  • Configure conditional access policies to require re-authentication or block access from anomalous IP addresses and unmanaged devices.

User Protection

  • Deploy advanced email security solutions capable of analyzing QR codes and identifying AI-generated phishing lures.
  • Ensure endpoint browsers are updated and utilize safe browsing features.

Security Awareness

  • Train employees, especially executives, on the risks of 'quishing' (QR code phishing) and the signs of sophisticated MFA bypass attacks.
  • Instruct users to never scan work-related QR codes with personal devices unless explicitly verified by IT.

MITRE ATT&CK Mapping

  • T1583.008 - Acquire Infrastructure: Malicious Software
  • T1583.001 - Acquire Infrastructure: Domains
  • T1566.002 - Phishing: Spearphishing Link
  • T1111 - Two-Factor Authentication Interception
  • T1539 - Steal Web Session Cookie
  • T1562.001 - Impair Defenses: Disable or Modify Tools

Additional IOCs

  • Other:
    • failspy/Meta-Llama-3-70B-Instruct-abliterated-v3.5 - Specific uncensored AI model used by the kit's AI Assistant to generate phishing lures.