
Japanese businesses and consumers are facing a surge in phishing attacks using the CoGUI malware. The scammers are posing as services from Amazon, Rakuten, and other popular services. Their goal is to steal credentials and payment information while skillfully avoiding detection.
Proofpoint is reporting a surge in phishing attacks in Japan using CoGUI. The tool allows cybercriminals to evade blocking and target users by sending emails impersonating Amazon, Rakuten, and other well-known brands.
Since the beginning of this year, Proofpoint has detected 172 million messages using the malware. However, the actual number could be much higher, as some of the attacks were blocked. Most often, attackers impersonate well-known payment services, transport card companies and even the Japanese tax office.
CoGUI has a unique ability to determine the characteristics of the victim’s device. This includes the IP address, browser type, screen size and operating system language. Based on the information received, attackers make a decision: to redirect the victim to a phishing resource or to the official website.
According to research, phishing campaigns are carried out approximately 50 times a month, each of which lasts from 3 to 5 days. The last major attack was recorded in March 2025. Then the fraudsters disguised themselves as Amazon and demanded to update their credentials.