New Bluekit Phishing Kit Targets Major Platforms with MFA B

New AI-Powered Bluekit Phishing Kit Targets Major Platforms with MFA Bypass Attacks

Bluekit Phishing Kit is a new PhaaS tool that targets major platforms, using AiTM techniques to steal session data and bypass MFA protections.

Varonis Threat Labs has discovered a new phishing-as-a-service kit called Bluekit that is making it much easier for cyberattackers to bypass security, even when users have extra protections turned on. This kit is basically like a one-stop shop for hackers, offering over 40 fake website templates that mimic big names like iCloud, Apple ID, Gmail, Outlook, Hotmail, Yahoo, ProtonMail, GitHub, Twitter, Zoho, Zara, and Ledger.

In the past, a hacker had to switch between different services to set up a scam. Bluekit changes all that by offering everything on a single dashboard where threat actors can buy domains, set up fake login pages, and track their victims in real-time.

Bypassing the MFA

The most dangerous part of Bluekit is that it handles security codes using a method called Adversary-in-the-Middle (AiTM). According to Varonis’ experts, when a victim enters their details on a fake Bluekit page, the kit doesn’t just grab the password; it also steals session cookies and local storage data. This is a huge problem because it facilitates an MFA (multi-factor authentication) bypass.

Those stolen cookies act like authenticated session tokens, which prove to a server that a user has already completed the login and identity verification process. By replaying these tokens, hackers can gain unauthorised access to an account without ever needing to interact with the victim’s multi-factor authentication prompt. The kit even keeps a live view of the target’s browser and sends all stolen data directly to the hacker via Telegram.

“Operators can buy or connect domains from the same interface used to manage phishing pages and captured logs, rather than splitting that work across separate services. That setup flow also extends into site creation itself. In the view we reviewed, operators could pick a domain, choose a mode, and select from a broad list of target brands and services, including consumer email providers and developer-facing platforms,” researchers explained.

Some templates supported by Bluekit (source: Varonis)

AI Without the Guardrails

Researchers noted that Bluekit also comes with its own AI assistant called Abliterated Llama, even though it lists famous models like GPT-4. For your information, abiliterated is a specific type of AI with safety filters stripped away, so while the actual Llama won’t comply, the abliterated version won’t refuse to help with a cyberattack.

Bluekit dashboard (source: Varonis)

Varonis threat researcher Daniel Kelley pointed out in the blog post shared with Hackread.com that while hackers used to try to jailbreak standard AI to help them, Bluekit shows a shift “toward open-weight models without safety guardrails, which is more consistent than working around prompt-level filters.”

Right now, the AI assistant mostly builds the campaign framework, often leaving placeholders for the hacker to fill in later. However, the developer is moving fast. New features like voice cloning, geolocation emulation, and antibot cloaking are being added constantly. With the kit evolving this quickly, researchers expect to see Bluekit appearing in many more cyberattacks soon.

Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage.
Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts