Chinese Hackers Flood Japan with 580 Million Phishing Emails Using ‘CoGUI’ Kit

Chinese hackers used the CoGUI phishing kit to send over 580 million scam emails to Japanese users in early 2025, impersonating brands like Amazon and PayPal.

Written By: Aminu Abdullahi
May 8, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A powerful new phishing campaign is flooding Japanese email inboxes.

According to reports by cybersecurity firm Proofpoint, a cybercrime tool known as CoGUI was used to send over 580 million phishing emails between January and April 2025. This wave of scams is designed to steal usernames, passwords, and payment information, mostly by impersonating major companies like Amazon, Rakuten, Apple, and PayPal.

“The highest volume threat in current Proofpoint campaign data is a phishing kit named CoGUI, which is actively targeting Japanese organizations,” said Proofpoint in a newly published report.

How the scam works

CoGUI phishing messages often come with urgent subject lines, pushing victims to act quickly. Some examples include:

  • “To protect your account, please update your account.” (Amazon-themed).
  • “[Spring Thanksgiving] Get an Amazon gift certificate & 100,000 PayPay points with entry!” (PayPay-themed).
  • “【Emergency Response】AI Investment Strategy for Tariff Crisis” (Rakuten-themed).

Once clicked, the links in these emails don’t immediately take all users to fake sites. Instead, CoGUI first checks the victim’s device, including IP location, browser type, screen size, language settings, and whether it’s mobile or desktop. If the system fits a targeted profile, the link loads a convincing fake login page.

If not, users are redirected to the real company website, reducing suspicion and making the scam harder to detect.

SEE: Quick Glossary: Cybersecurity Attack Response and Mitigation (TechRepublic Premium)

Japan is the main target, but not the only one

Most phishing attempts focus on Japan, where Proofpoint observed millions of messages per campaign. Over 172 million phishing emails were tracked across 170 campaigns in January alone. Other countries like the U.S., Canada, Australia, and New Zealand have also seen activity, though on a much smaller scale.

This pattern of targeting lines up with an alert from Japan’s Financial Services Agency, which recently warned of an increase in phishing aimed at financial institutions.

Who’s behind the CoGUI kit?

Proofpoint believes that Chinese-speaking threat actors are behind CoGUI. While it shares similarities with another phishing kit called Darcula, which is also linked to Chinese hackers, the two platforms are not directly related.

“Interestingly, while investigating CoGUI phish kits, researchers noticed similarities to another type of activity Proofpoint is tracking: Road Toll Smishing, …Since 2025, Road Toll Smishing infrastructure has evolved to use a phish kit called Darcula,” said Selena Larson, a staff threat researcher with Proofpoint. “Ultimately, our analysis found that the Darcula phish kit is unrelated to CoGUI and its presence in Road Toll Smishing is notably different. ”

Both CoGUI and Darcula contain Chinese code elements and use the same user-profiling techniques, but their targeting methods differ. Darcula mostly hits mobile users, while CoGUI targets users on mobile or web browsers.

What can you do to stay safe?

Phishing emails often look trustworthy and include logos and branding from familiar companies. Cybersecurity experts advise against clicking links in suspicious emails. Instead, go directly to the official website and log in.

Organizations should also educate employees about phishing scams and implement multifactor authentication (MFA) across services. However, to protect against more advanced threats, hardware-based security keys like FIDO are recommended.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

Cybersecurity Budget Growth Hits Five-Year Low as Economic Pressures Mount

Cybersecurity spending growth slowed to just 4% in 2025—the lowest in five years—raising concerns about underfunded teams facing increasingly sophisticated threats.

Aminu Abdullahi
Aug 13, 2025
Inside Microsoft’s Real-Time War Against Cybersecurity Threats

At Black Hat 2025, Microsoft revealed how its security teams work in real time to outpace hackers and stop attacks before they escalate.

Matt Gonzales
Aug 9, 2025
Black Hat 2025: What Keeps Cyber Experts Up at Night?

TechnologyAdvice’s Matt Gonzales interviewed cyber experts at Black Hat 25 about the topics they’re watching most closely. The topics include AI, deepfakes, and human error.

Matt Gonzales
Aug 9, 2025
Former New York Times Cyber Reporter Issues Chilling Warning at Black Hat

At Black Hat 2025, a former New York Times reporter warned that AI-driven cyber threats are accelerating and that only courage can guide the response.

Matt Gonzales
Aug 7, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.