Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Scams Exploit LiveChat to Extract User Data

Phishing Scams Exploit LiveChat to Extract User Data

Posted on March 17, 2026 By CWS

A new phishing strategy has emerged, leveraging legitimate customer support platforms to pilfer sensitive user data. Cybercriminals have targeted LiveChat, a popular Software-as-a-Service (SaaS) tool for real-time customer interactions, to execute sophisticated phishing schemes.

LiveChat: The New Frontier for Phishing Attacks

This campaign marks a departure from traditional phishing techniques, embracing more personalized tactics that are difficult to identify. Unlike standard phishing emails that direct users to fake login sites, this method engages victims in a live chat environment, resembling authentic support sessions from well-known brands such as PayPal and Amazon.

Through cleverly crafted emails, victims are enticed with promises of refunds or order confirmations, leading them to links hosted on LiveChat’s domain, lc[.]chat.

Social Engineering Tactics in Phishing Emails

Research by Cofense unveiled this operation through an analysis of two distinct phishing emails, each adopting a unique lure and brand. One email impersonated PayPal, suggesting a $200 refund and prompting a click on a ‘View Transaction Details’ button. The other email, lacking an immediate brand reference, claimed a pending order requiring confirmation via a ‘View Update’ link.

Both emails exploited social engineering—one leveraging financial curiosity, the other urgency and vagueness to spur action. Upon clicking, users were redirected to LiveChat-hosted pages mimicking different brands, where they faced automated or scripted chat agents requesting personal data.

Layered Data Harvesting Techniques

The data extraction process was methodical and layered. In the Amazon variant, the chat agent sought the user’s email, phone number, birth date, and address under the guise of identity verification. The interaction’s unpolished language hinted at a human operator following a scripted routine.

As the conversation progressed, the agent deceived users into providing credit card information, reassuring them of confidentiality—a typical ploy to gain trust. The PayPal version diverted victims to a counterfeit login page, capturing credentials and multi-factor authentication (MFA) codes to bypass security protocols.

Both phishing pages aimed to establish comprehensive identity and financial profiles, highlighting the need for vigilance.

Users and organizations should be skeptical of unsolicited emails concerning refunds or order verifications, especially those directing through chat links. Requests for MFA codes or financial details via chat interfaces are significant warning signs. Security teams must monitor traffic to lc[.]chat domains and block malicious URLs linked to these attacks.

Cyber Security News Tags:Amazon phishing, customer support, Cybersecurity, data theft, LiveChat, PayPal phishing, Phishing, SaaS, scam prevention, security alert

Post navigation

Previous Post: Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
Next Post: Critical Chrome 0-Day Flaws Demand Immediate Action

Related Posts

Microsoft Upgrades .NET Bounty Program with Rewards Up to ,000 Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
Cybercriminals Exploit Microsoft Tools in New Phishing Scheme Cybercriminals Exploit Microsoft Tools in New Phishing Scheme Cyber Security News
Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites Cyber Security News
Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark