Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phishing attack uses stolen credentials to install LogMeIn RMM for permanent access
Identity

Phishing attack uses stolen credentials to install LogMeIn RMM for permanent access

userBy userJanuary 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananJanuary 23, 2026Email security/endpoint security

Cybersecurity researchers have detailed a new dual-vector campaign that leverages stolen credentials to deploy legitimate remote monitoring and management (RMM) software to gain persistent remote access to compromised hosts.

“Instead of deploying custom viruses, attackers are circumventing security boundaries by weaponizing necessary IT tools that administrators trust,” said Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke, researchers at KnowBe4 Threat Labs. “It turns legitimate remote monitoring and management (RMM) software into a persistent backdoor by stealing the system’s ‘skeleton key’.”

This attack unfolds in two different waves. Attackers use fake invitation notifications to steal victims’ credentials, which they then use to deploy RMM tools to establish permanent access.

cyber security

The fake email appears to be an invitation from a legitimate platform called Greenvelope, and is designed to trick recipients into clicking a phishing URL designed to collect login information for Microsoft Outlook, Yahoo!, and AOL.com. Once this information is obtained, the attack proceeds to the next phase.

Specifically, the attacker uses a compromised email to register with LogMeIn and generate an RMM access token. This token is deployed in subsequent attacks via an executable named ‘GreenVelopeCard.exe’ to establish persistent remote access to the victim system.

The binary, signed with a valid certificate, contains JSON configuration that silently installs LogMeIn Resolve (formerly known as GoTo Resolve) and serves as a conduit to connect to an attacker-controlled URL without the victim’s knowledge.

Once the RMM tool is deployed, attackers can use remote access as a weapon to modify service settings and allow them to run on Windows with unrestricted access. The attack also establishes a hidden scheduled task that automatically launches the RMM program even if the user manually terminates it.

To combat this threat, organizations are encouraged to monitor unauthorized RMM installation and usage patterns.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU accelerates quantum readiness with €50 million photonic chip trial
Next Article TikTok establishes joint venture in the U.S. to continue business pursuant to 2025 Executive Order
user
  • Website

Related Posts

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

February 4, 2026

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

February 4, 2026

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Orchid Security brings continuous identity observability to enterprise applications

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.