Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access - The Hacker News
The Hacker NewsArchived Mar 18, 2026✓ Full text saved
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access The Hacker News
Full text archived locally
✦ AI Summary· Claude Sonnet
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
Ravie LakshmananJan 23, 2026Email Security / Endpoint Security
Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts.
"Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust," KnowBe4 Threat Labs researchers Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke said. "By stealing a 'skeleton key' to the system, they turn legitimate Remote Monitoring and Management (RMM) software into a persistent backdoor."
The attack unfolds in two distinct waves, where the threat actors leverage fake invitation notifications to steal victim credentials, and then leverage those pilfered credentials to deploy RMM tools to establish persistent access.
The bogus emails are disguised as an invitation from a legitimate platform called Greenvelope, and aim to trick recipients into clicking on a phishing URL that's designed to harvest their Microsoft Outlook, Yahoo!, AOL.com login information. Once this information is obtained, the attack moves to the next phase.
Specifically, this involves the threat actor registering with LogMeIn using the compromised email to generate RMM access tokens, which are then deployed in a follow-on attack through an executable named "GreenVelopeCard.exe" to establish persistent remote access to victim systems.
The binary, signed with a valid certificate, contains a JSON configuration that acts as a conduit to silently install LogMeIn Resolve (formerly GoTo Resolve) and connect to an attacker-controlled URL without the victim's knowledge.
With the RMM tool now deployed, the threat actors weaponize the remote access to alter its service settings so that it runs with unrestricted access on Windows. The attack also establishes hidden scheduled tasks to automatically launch the RMM program even if it's manually terminated by the user.
To counter the threat, it's advised that organizations monitor for unauthorized RMM installations and usage patterns.
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
Credential Theft, cybersecurity, email security, endpoint security, Malware, Phishing, Remote Access, windows security
Trending News
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine and More
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack and Vibe-Coded Malware
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Popular Resources
Self-Hosted WAF: Block SQLi, XSS, and Bots Before They Reach Your Apps
Identity Controls Checklist: Find Missing Protections in Apps
19,053 Confirmed Breaches in 2025 – Key Trends and Predictions for 2026
Read CYBER360 2026: From Zero Trust Limits to Data-Centric Security Paths