Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Posted on January 23, 2026January 23, 2026 By CWS

Ravie LakshmananJan 23, 2026Email Safety / Endpoint Safety
Cybersecurity researchers have disclosed particulars of a brand new dual-vector marketing campaign that leverages stolen credentials to deploy reliable Distant Monitoring and Administration (RMM) software program for persistent distant entry to compromised hosts.
“As a substitute of deploying customized viruses, attackers are bypassing safety perimeters by weaponizing the mandatory IT instruments that directors belief,” KnowBe4 Menace Labs researchers Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke stated. “By stealing a ‘skeleton key’ to the system, they flip reliable Distant Monitoring and Administration (RMM) software program right into a persistent backdoor.”
The assault unfolds in two distinct waves, the place the risk actors leverage faux invitation notifications to steal sufferer credentials, after which leverage these pilfered credentials to deploy RMM instruments to determine persistent entry.

The bogus emails are disguised as an invite from a reliable platform known as Greenvelope, and goal to trick recipients into clicking on a phishing URL that is designed to reap their Microsoft Outlook, Yahoo!, AOL.com login data. As soon as this data is obtained, the assault strikes to the subsequent part.
Particularly, this entails the risk actor registering with LogMeIn utilizing the compromised e mail to generate RMM entry tokens, that are then deployed in a follow-on assault by an executable named “GreenVelopeCard.exe” to determine persistent distant entry to sufferer techniques.
The binary, signed with a legitimate certificates, comprises a JSON configuration that acts as a conduit to silently set up LogMeIn Resolve (previously GoTo Resolve) and connect with an attacker-controlled URL with out the sufferer’s data.
With the RMM instrument now deployed, the risk actors weaponize the distant entry to change its service settings in order that it runs with unrestricted entry on Home windows. The assault additionally establishes hidden scheduled duties to robotically launch the RMM program even when it is manually terminated by the consumer.
To counter the risk, it is suggested that organizations monitor for unauthorized RMM installations and utilization patterns.

The Hacker News Tags:Access, Attack, Credentials, Install, LogMeIn, Persistent, Phishing, RMM, Stolen

Post navigation

Previous Post: TrustAsia Revoked 143 Certificates Following LiteSSL ACME Service Vulnerability
Next Post: New Windows Notepad and Paint Update Brings More Useful AI Features

Related Posts

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs The Hacker News
n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens The Hacker News
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark