Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials

Posted on October 3, 2025October 3, 2025 By CWS

APT SideWinder, a state-sponsored menace actor lengthy related to espionage throughout South Asia, has not too long ago launched a marketing campaign deploying phishing portals that mimic official Outlook and Zimbra webmail companies.

Rising in mid-2025, this operation makes use of free internet hosting platforms akin to Netlify, pages.dev, and employees.dev to serve faux login pages tailor-made to authorities and navy targets in Pakistan, Nepal, Sri Lanka, Bangladesh, and Myanmar.

By exploiting maritime and defense-themed lure paperwork, SideWinder not solely harvests person credentials through direct POST requests but additionally phases malware in uncovered directories for subsequent retrieval.

Starting in August 2025, Hunt.io telemetry noticed speedy area churn—new phishing websites appeared each three to 5 days—underscoring a excessive operational tempo.

Many pages spoofed the Directorate Basic of Protection Purchases (DGDP) in Bangladesh, providing “Secured File” portals that prompted victims for e mail credentials underneath the guise of accessing Turkish protection gear particulars.

Concurrently, Nepal’s Ministry of Finance workers acquired invites to view PDF decoys titled “सम्माननीय प्रधानमन्त्रीज्यूको चीन भ्रमण सम्बन्धमा.pdf,” which redirected to a counterfeit Outlook login hosted on Netlify (98.84.224.111).

Pretend Outlook webmail login web page uncovered by Hunt.io, focusing on Nepal’s Ministry of Finance and hosted on Netlify (Supply – Hunt.io)

Hunt.io analysts famous the malware’s capacity to mix social engineering with easy, efficient credential assortment.

In a single SUPARCO-targeted website, JavaScript logic encodes the sufferer’s e mail in Base64 earlier than redirecting to a secondary phishing web page, then overlays a reload immediate to seize recent inputs.

This staged redirection and obfuscation each tracks periods and thwarts informal inspection.

JavaScript logic from the SUPARCO phishing package displaying Base64 encoding of the sufferer’s e mail and staged redirection (Supply – Hunt.io)

The an infection mechanism underpinning these faux portals depends on direct kind submissions to attacker-controlled servers moderately than client-side malware payloads.

A typical HTML kind noticed within the SUPARCO phishing package posts captured credentials to the endpoint

The hidden inbox subject carries a Base64-encoded tackle to correlate stolen credentials with particular campaigns.

As soon as harvested, these credentials feed into broader espionage workflows, granting SideWinder entry to restricted networks or facilitating follow-on malware deployment from open directories at IPs akin to 47.236.177.123 and 31.14.142.50.

By internet hosting portals on extensively used, trusted platforms, SideWinder evades easy domain-based blocks and leverages speedy redeployment as soon as URLs are taken down.

Countermeasures ought to embody steady monitoring of free internet hosting domains, superior filtering of kind POST requests to unknown servers, and person coaching to acknowledge document-based lures tied to login prompts. 开心 with community segmentation and enforced multi-factor authentication, organizations can restrict credential-based intrusions even when phishing makes an attempt succeed.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Credentials, Fake, Group, Hacker, Hosting, Login, OutlookZimbra, Portals, SideWinder, Steal

Post navigation

Previous Post: Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities
Next Post: Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks

Related Posts

New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection Cyber Security News
Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News