Security & Infrastructure Tools
New Bluekit phishing service includes an AI assistant, 40 templates
BlueKit debuts as a phishing toolkit with over 40 templates for services like Outlook, Gmail, iCloud, GitHub, and Ledger, plus an AI Assistant panel that supports models such as Llama, GPT-4.1, Claude, Gemini, and DeepSeek to draft campaigns. It offers end-to-end functionality—from domain purchase and phishing-page setup to campaign management and real-time monitoring, with data exfiltration possible via Telegram. Early reviews from Varonis say the AI drafts are skeletal and contain placeholders, indicating the feature set is still evolving, but the kit exemplifies the growing AI-enabled, all-in-one phishing platforms.

BlueKit Phishing Service: AI Assistant and 40 Templates Raise the Bar for Campaign Automation
OverviewA newly released phishing kit, BlueKit, stacks a broad set of features into a single toolkit designed to streamline the creation, management, and execution of phishing campaigns. At its core, BlueKit packages more than 40 ready-made templates that impersonate popular services, alongside an AI Assistant panel intended to help draft campaign content. The combination is presented as an all-in-one solution that can target a range of accounts and services, while offering a centralized interface for managing domains, phishing pages, and campaign workflows.
Templates Across High-Value TargetsBlueKit ships a diverse roster of templates designed to mimic trusted brands and services. Key categories include:
- Email providers: Outlook, Hotmail, Gmail, Yahoo, ProtonMail
- Cloud services: iCloud
- Developer platforms: GitHub
- Cryptocurrency and hardware wallets: Ledger
- Other recognizable brands and platforms in the sample offerings
Each template is described as featuring realistic designs and logos, aiming to replicate legitimate login flows and branding to enhance credibility in a phishing attempt. Operators can choose among templates to align with their target’s perceived relevance and trust cues.
AI Assistant: Drafting Phishing Content at ScaleA standout feature of BlueKit is an AI Assistant panel that supports multiple AI models. The included options span several prominent families, enabling the drafting of phishing emails and related content. The integration is positioned as a way to generate campaign skeletons, outlines, and drafts that operators can refine for delivery. Early evaluations suggest the outputs provide structure and flow but may require substantial cleanup before use, including filling in concrete links, blocks, and copy tailored to a given target.
What this means in practice is a workflow where campaign ideas, subject lines, and body content can be generated rapidly, then adjusted to match the chosen template and phishing page behavior. The AI-driven approach is described as a tool for accelerating content generation and reducing the manual effort required to assemble multiple campaigns.
Unified Interface and Campaign ManagementBeyond templates and AI-assisted content, BlueKit is advertised as integrating core phishing operations into a single panel. This includes:
- Domain purchase and registration workflows
- Phishing page setup and customization
- Campaign management features to oversee multiple runs
- Real-time monitoring of victim sessions as interactions unfold
The dashboard is framed as providing granular control over the phishing page experience. Users can tailor how pages redirect, what happens during login attempts, and how data is captured and processed. The interface also highlights options to adjust for anti-analysis measures and to influence the login flow, all within a cohesive environment.
Post-Capture Visibility and Data FlowBlueKit’s monitoring capabilities extend to post-capture activity. Operators can observe:
- Cookies and local storage data exposed during sessions
- Live session state and what the victim sees after login attempts
- Information captured during the login process to inform subsequent adjustments to the attack
Exfiltration and Communication ChannelsStolen data is described as being exfiltrated through messaging channels accessible to the operators, with private channels used for ongoing collection and review. The emphasis on centralized data handling underscores the kit’s aim of reducing the technical overhead for actors engaging in credential theft and related fraud.
Security and Development StatusIndependent security researchers have looked at an early or limited version of the AI Assistant component and found that generated content tended to rely on placeholders and generic structures. This early-stage output suggests that while the AI features contribute to rapid draft generation, the results require careful human refinement before deployment. Observers note that BlueKit remains in active development, with frequent updates and rapid evolution that could lead to broader adoption among various criminal operators.
Context within the broader threat landscapeBlueKit sits within a broader trend of AI-enabled cybercrime platforms that aim to scale operations and reduce the manual labor involved in phishing campaigns. Observers point to parallels in other AI-assisted attack surfaces, including voice-driven social engineering and automated workflow orchestration. The combination of templates, AI-assisted drafting, and integrated campaign management highlights a move toward more accessible, end-to-end phishing toolkits that lower technical barriers for would-be criminals.
Release and EvolutionEarly release notes describe ongoing improvements and new templates, with a pattern of rapid iterations. The kit’s architecture supports domain management, page behavior customization, and real-time monitoring, all designed to streamline the lifecycle of a phishing attack. The evolving nature of BlueKit suggests that its capabilities, as well as its potential attack surface, will continue to develop in the near term.
Illustrative visuals and samplesProminent visuals and samples accompanying BlueKit showcase a range of template designs, login layouts, and branding elements intended to mimic legitimate services. These materials emphasize the perceived realism of the phishing experiences and the potential impact on unsuspecting users.
Implications for defenders and incident responseThe emergence of BlueKit reinforces the importance of layered security awareness, phishing simulations, and robust credential protection. As automated and AI-assisted tools become more prevalent, defenses must emphasize:
- User education on recognizing credential prompts and legitimate domain cues
- Multi-factor authentication adoption to mitigate credential theft
- Monitoring for unusual login patterns and domain registrations associated with phishing campaigns
- Rapid incident response to isolate and remediate credential compromise
In summary, the BlueKit phishing suite signals a notable advance in how phishing campaigns can be constructed, managed, and scaled using AI-assisted automation. While the technology is framed as a developer-friendly toolkit for cybercriminals, it also reinforces the ongoing need for vigilant security practices and proactive defense strategies to mitigate evolving threats.