Breakglass Intelligence investigated a SideWinder APT credential harvesting campaign targeting South Asian military and government organizations through systematic abuse of legitimate Platform-as-a-Service (PaaS) providers. Starting from a single phishing URL on Zeabur (a Taiwanese PaaS), we mapped 20 infrastructure nodes across 8 platforms spanning a 5-month campaign (November 2025 to April 2026). The campaign targets Pakistan military, Pakistan telecommunications, and Bangladesh government/military organizations using cloned Zimbra webmail login pages with a sophisticated multi-stage credential harvesting flow that collects victim passwords twice. We identified a confirmed victim email address belonging to a Margalla Heavy Industries Limited (MHIL) project coordinator, decoded directly from a phishing URL parameter. Two phishing sites remain LIVE and actively harvesting credentials as of April 5, 2026.
November 2025 through April 2026 (5+ months continuous)
Attack Chain
[Spearphishing Email]
|
v
[URL Shortener] (short.gy, tinyurl.cx, Replit) <-- disposable redirector
|
v
[Root Page on PaaS] (Zeabur/Railway/Leapcell/CF Workers)
|-- Displays PDF lure document in <object> tag
|-- Auto-redirects to /load.html after 1 second
|
v
[Loading Page] (/load.html)
|-- Shows loading spinner
|-- Redirects to /login.html after 3 seconds
|-- Passes base64-encoded victim email
|
v
[First Credential Harvest] (/login.html) <-- Zimbra clone, Bangladesh Navy branding
|-- Pre-fills victim username from base64 param
|-- "Session Expired" social engineering
|-- POSTs credentials to /submit
|
v
[Server-Side Processing] (/submit)
|-- Stores credentials
|-- Redirects to /login/ with base64 email
|
v
[Second Credential Harvest] (/login/) <-- Zimbra clone, Pakistan Air Force branding
|-- Pre-fills victim email from server
|-- "Wrong password" social engineering
|-- POSTs credentials to /try
|
v
[Final Redirect] (/try)
|-- Redirects to legitimate-looking PDF document
|-- "Contract Agreement with Stall Builder for Fabrication of Pak Pavilion.pdf"
|-- Completes social engineering illusion
Key Insight: The dual-harvest design suggests the actor is targeting victims who may have credentials at MULTIPLE organizations (e.g., military personnel with both Bangladesh Navy and Pakistan Air Force accounts, or defense contractors with access to multiple government mail systems).
The actor uses long, pseudo-random parameter names as tracking/routing identifiers:
Parameter
Used On
Purpose
gfjdliotrgojnghgherbegrehureert0e0ee
/login.html
Victim email (base64), present across ALL campaign instances
bfjkdghurehgjufhdkhgruiegbvousdhfowehr
/load.html
Victim tracking, intermediary redirect
hfdgdhguirehfdhgfdrereoh
/login/ (post-theft)
Victim email (base64), server-generated
contract-agreement-with-staff
/ (root, MHIL)
Campaign identifier / entry gate
WsdftYdsfsdRadyweEdfdesIsdfjdsP
/ (root, Nayatel)
Campaign identifier / entry gate
weriouiof23dskjhvxwtue546iysdfcnbv
/ (root, CF Workers)
Campaign identifier / entry gate
oasnxsauhbasdbxsa
/ (root, early)
Campaign identifier / entry gate
file1newdownload7r4ygduegur7348ru2ggru
/ (root, BCC)
Campaign identifier / entry gate
Critical OPSEC Fingerprint: The parameter gfjdliotrgojnghgherbegrehureert0e0ee is UNIQUE to this actor and present across ALL 20 infrastructure nodes over 5 months. This is the strongest single indicator for campaign tracking and detection.
Social Engineering Lures
Campaign
PDF Lure
Target Context
MHIL (contract-agreement-with-staff)
"Contract Agreement with Stall Builder for Fabrication of Pak Pavilion"
Pakistan defense exhibition stall construction
Nayatel (zimbramail-nayatel-com)
"Mechanical Interface requirements"
Telecommunications engineering document
HR-themed (staff-performance-appraisals)
Staff performance appraisals
Generic HR document
BCC (maill-bcc-gov-bd-pdf)
Unknown (site dead)
Bangladesh government document
Document-themed (openthesubjectfile)
"Open the subject file" (implied)
Generic document lure
Error Messages Used
First harvest: "Your Session Expired Enter Password to Sign in again!!." (extra period, double exclamation)
Second harvest: "Wrong password re-enter your password to sign in again!!." (double exclamation)
Impersonated Services
Stage
Service
Banner Link
Logo
First credential harvest
Zimbra Web Client
hxxp://mail.navy.mil[.]bd/
zimbra.png (generic)
Second credential harvest
Zimbra Web Client
hxxp://mail.paf.gov[.]pk/
zimbra.png (generic)
Note: The alt attribute on the Zimbra logo image reads "HIT logo" -- this is a residual artifact that likely references HIT (Harbin Institute of Technology) or a prior version of the phishing kit that targeted a different organization.
Victim Analysis
Confirmed Victims
Organization
Sector
Country
Evidence
Confidence
Margalla Heavy Industries Ltd (MHIL)
Defense Manufacturing
Pakistan
Victim email pgcoord-251@margallahil[.]com decoded from URL param
CONFIRMED
Targeted Organizations
Organization
Sector
Country
Evidence
Confidence
Bangladesh Navy
Military
Bangladesh
Banner link mail.navy.mil[.]bd in Stage 1 login
HIGH
Pakistan Air Force (PAF)
Military
Pakistan
Banner link mail.paf.gov[.]pk in Stage 2 login
HIGH
Nayatel
Telecommunications/ISP
Pakistan
4 dedicated phishing subdomains across 3 platforms
Reused unique parameter name (gfjdliotrgojnghgherbegrehureert0e0ee) across ALL infrastructure for 5+ months -- enables trivial campaign tracking
Hardcoded CSRF token (ec529cbe-89f5-4964-b46f-b3dc29789899) is identical across all instances -- not dynamically generated
Typo in PDF lure filename: Root page uses "Csontract" while final redirect uses "Contract" -- copy-paste error
Typo in Cloudflare Workers subdomain: "zimramail" instead of "zimbramail" -- keyboard error
Victim email leaked in URL: Base64-encoded victim email pgcoord-251@margallahil[.]com visible in URLScan submission
Alt text artifact: Logo alt="HIT logo" reveals a prior kit version or shared template
Same phishing kit structure across all platforms with identical CSS/JS/HTML -- no per-deployment obfuscation
Express.js X-Powered-By header not disabled -- reveals server technology
Campaign Evolution (Nov 2025 - Apr 2026)
Phase
Period
Platforms
Notes
Phase 1
Nov 2025
Zeabur only
Initial deployment, page-view-mail subdomain
Phase 2
Dec 2025 - Jan 2026
Zeabur + Back4App + Railway + Leapcell
Platform diversification begins
Phase 3
Feb 2026
Railway + URL shorteners (tinyurl.cx)
Added redirector layer
Phase 4
Mar 2026
Leapcell + CF Workers + Replit + Zeabur
Maximum platform diversity, Nayatel focus
Phase 5
Apr 2026
Zeabur (consolidated)
Two active sites, matured kit
The actor progressively diversified across more platforms (likely as earlier deployments were detected/taken down) before consolidating back to Zeabur for the latest wave.
Cross-Reference with Prior Breakglass SideWinder Investigations
Error text: "Your Session Expired Enter Password to Sign in again!!."
Error text: "Wrong password re-enter your password to sign in again!!."
Logo alt text: "HIT logo"
Form action endpoints: /submit (first harvest), /try (second harvest)
Recommended Actions
Immediate (24-48 hours)
Block all IOCs listed above at email gateway, web proxy, and DNS resolver level
Notify Zeabur (abuse@zeabur.com) to take down the two LIVE phishing sites
Notify MHIL (Margalla Heavy Industries) that the email pgcoord-251@margallahil[.]com has been targeted -- password reset required
Notify BD-CERT regarding Bangladesh Navy targeting
Notify Pakistan CERT (PKCERT/NR3C) regarding PAF and MHIL targeting
Search email logs for the unique parameter string gfjdliotrgojnghgherbegrehureert0e0ee to identify any employees who clicked
Short-term (1-2 weeks)
Implement detection rules (YARA/Suricata below) for the phishing kit fingerprints
Monitor crt.sh and URLScan for new deployments matching the campaign fingerprint
Report URL shortener links to short.gy and tinyurl.cx for takedown
Notify Leapcell, Railway, Cloudflare, Replit, and Back4App of historical abuse
Medium-term (1-3 months)
Block PaaS platforms at the subdomain level where organizational policy permits (especially for organizations in the target profile)
Implement DMARC/DKIM/SPF enforcement to reduce spearphishing delivery success
Deploy phishing-resistant MFA (FIDO2/WebAuthn) for all Zimbra deployments in targeted organizations
Abuse Reports
Zeabur (Priority: CRITICAL -- 2 LIVE sites)
To: Zeabur Trust & Safety
Subject: Active phishing sites on Zeabur platform — credential harvesting
Two active phishing deployments are impersonating Zimbra webmail to steal credentials
from Pakistan/Bangladesh military and government personnel:
1. contract-agreement-with-staff.zeabur.app (LIVE - credential harvester)
2. zimbramail-nayatel-com.zeabur.app (LIVE - credential harvester)
These are part of a nation-state espionage campaign (SideWinder APT) that has abused
your platform since November 2025. Seven historical subdomains have also been used.
Request immediate takedown and account suspension.
References
@volrant136 (Hunt.io): Original IOC disclosure (April 2, 2026)