Server-Side Phishing: How Credential Theft Campaigns Are Hiding in Plain Sight

April 16, 2025, 2:21 p.m.

Description

This analysis explores an ongoing phishing campaign targeting employee and member portals using a PHP-based phishing kit. The campaign has evolved from using client-side redirects to server-side credential validation, making detection more challenging. Multiple domains impersonating corporate login portals were identified, hosted on infrastructure linked to Chang Way Technologies Co. Limited. The phishing pages employ sophisticated tactics, including two-factor authentication bypasses and decoy content. The campaign's infrastructure and techniques suggest a persistent, possibly state-linked threat actor adapting their methods to evade detection and maintain access to enterprise environments.

Date

  • Created: April 15, 2025, 8:46 p.m.
  • Published: April 15, 2025, 8:46 p.m.
  • Modified: April 16, 2025, 2:21 p.m.

Attack Patterns

Additional Informations

  • Food Service
  • Healthcare
  • Transportation
  • Finance
  • Government
  • Canada
  • United States of America