Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Scams Exploit LiveChat to Extract User Data

Phishing Scams Exploit LiveChat to Extract User Data

Posted on March 17, 2026 By CWS

A new phishing strategy has emerged, leveraging legitimate customer support platforms to pilfer sensitive user data. Cybercriminals have targeted LiveChat, a popular Software-as-a-Service (SaaS) tool for real-time customer interactions, to execute sophisticated phishing schemes.

LiveChat: The New Frontier for Phishing Attacks

This campaign marks a departure from traditional phishing techniques, embracing more personalized tactics that are difficult to identify. Unlike standard phishing emails that direct users to fake login sites, this method engages victims in a live chat environment, resembling authentic support sessions from well-known brands such as PayPal and Amazon.

Through cleverly crafted emails, victims are enticed with promises of refunds or order confirmations, leading them to links hosted on LiveChat’s domain, lc[.]chat.

Social Engineering Tactics in Phishing Emails

Research by Cofense unveiled this operation through an analysis of two distinct phishing emails, each adopting a unique lure and brand. One email impersonated PayPal, suggesting a $200 refund and prompting a click on a ‘View Transaction Details’ button. The other email, lacking an immediate brand reference, claimed a pending order requiring confirmation via a ‘View Update’ link.

Both emails exploited social engineering—one leveraging financial curiosity, the other urgency and vagueness to spur action. Upon clicking, users were redirected to LiveChat-hosted pages mimicking different brands, where they faced automated or scripted chat agents requesting personal data.

Layered Data Harvesting Techniques

The data extraction process was methodical and layered. In the Amazon variant, the chat agent sought the user’s email, phone number, birth date, and address under the guise of identity verification. The interaction’s unpolished language hinted at a human operator following a scripted routine.

As the conversation progressed, the agent deceived users into providing credit card information, reassuring them of confidentiality—a typical ploy to gain trust. The PayPal version diverted victims to a counterfeit login page, capturing credentials and multi-factor authentication (MFA) codes to bypass security protocols.

Both phishing pages aimed to establish comprehensive identity and financial profiles, highlighting the need for vigilance.

Users and organizations should be skeptical of unsolicited emails concerning refunds or order verifications, especially those directing through chat links. Requests for MFA codes or financial details via chat interfaces are significant warning signs. Security teams must monitor traffic to lc[.]chat domains and block malicious URLs linked to these attacks.

Cyber Security News Tags:Amazon phishing, customer support, Cybersecurity, data theft, LiveChat, PayPal phishing, Phishing, SaaS, scam prevention, security alert

Post navigation

Previous Post: Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
Next Post: Critical Chrome 0-Day Flaws Demand Immediate Action

Related Posts

Chinese Cyber Espionage Targets Singapore Telecom Industry Chinese Cyber Espionage Targets Singapore Telecom Industry Cyber Security News
Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Cyber Security News
Vortex Werewolf Targets Russian Networks with Tor Vortex Werewolf Targets Russian Networks with Tor Cyber Security News
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs Cyber Security News
New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale Cyber Security News
Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Cyberattacks: AI, APIs, and DDoS Converge
  • Konni Uses Phishing to Spread EndRAT via KakaoTalk
  • Phishing Campaign Targets Microsoft Teams via Compromised Sites
  • Critical Chrome 0-Day Flaws Demand Immediate Action
  • Phishing Scams Exploit LiveChat to Extract User Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Cyberattacks: AI, APIs, and DDoS Converge
  • Konni Uses Phishing to Spread EndRAT via KakaoTalk
  • Phishing Campaign Targets Microsoft Teams via Compromised Sites
  • Critical Chrome 0-Day Flaws Demand Immediate Action
  • Phishing Scams Exploit LiveChat to Extract User Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News