Thursday, April 24, 2025
HomeCyber AttackServer-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises.

This strategic shift to server-side operations is designed to evade detection and complicate analysis.

Evolving Phishing Techniques

Recent investigations have highlighted a marked evolution in the tactics employed by phishing campaigns.

- Advertisement - Google News

Traditional methods relied on client-side redirects to validate stolen credentials, but the current setup leverages server-side checks to do so.

According to the Hunt, this change was noted when researchers, after identifying an initial attack vector through a Google Ads malvertising campaign targeting Lowe’s employees, expanded their search to uncover similar phishing operations.

Using sophisticated tools like HuntSQL, a targeted query within the crawler dataset helped pinpoint pages exhibiting the new server-side behavior.

A notable example includes the domain myinfoaramapay[.]com, which closely mimics Aramark’s legitimate employee access portal but with subtle alterations like the removal of the virtual assistant feature.

Server-Side Phishing Attacks
 Screenshot of the phishing page at myinfoaramapay[.]com.

Technical Analysis

Further analysis revealed that once credentials are entered into these fraudulent sites, JavaScript codes capture the data and submit it to a PHP backend script, xxx.php.

Instead of immediate client-side validation, these scripts now trigger a new endpoint, check.php, to verify credentials server-side. This includes:

  • Immediate redirection to a legitimate login page upon successful verification.
  • An alert and page refresh if credentials are incorrect.
  • Silent polling if the server does not respond.

This backend logic significantly reduces the visibility of the phishing flow, making it harder for defenders to detect and analyze the attack.

In examining the infrastructure, which is hosted by Chang Way Technologies Co. Limited in Russia, researchers identified multiple domains on IP 80.64.30[.]101, including those mimicking major corporations like AT&T and AFLAC.

An intriguing aspect is the use of a decoy website “Technology Pharmacy CVS” directly accessible via the IP, which could be an attempt to misdirect investigations or appear legitimate to service providers.

Defenders are urged to monitor for unusual POST requests to scripts like xxx.php and check.php, especially from domains resembling enterprise login pages.

Server-Side Phishing Attacks
Malicious login page impersonating Highmark.

Also, observing for traffic with specific parameters that might indicate secondary authentication attempts or server-side credential validation could provide early detection of such phishing attempts.

This ongoing campaign underscores the need for vigilance and updated security measures, particularly in environments where two-factor authentication is in play yet still susceptible to these sophisticated phishing techniques.

Indicators of Compromise (IOCs)

IP AddressDomainHostingLocation
80.64.30.100ipafranchest.comCloudflareRussia, US
80.64.30.101lawpaymentpw.liveChang Way Technologies Co. LimitedRussia, US
104.21.32.181(Refer to full report)CloudflareRussia, US
172.67.153.52(Refer to full report)Chang Way Technologies Co. LimitedRussia, US
104.21.20.29(Refer to full report)CloudflareRussia, US
172.67.191.1(Refer to full report)Chang Way Technologies Co. LimitedRussia, US

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

WhatsApp Launches Advanced Privacy Tool to Secure Private Chats

WhatsApp, the world’s leading messaging platform, has unveiled a major privacy upgrade called "Advanced...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...