• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

You are here: Home / General Cyber Security News / Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
January 23, 2026

Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts.

“Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust,” KnowBe4 Threat Labs researchers Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke said. “By stealing a ‘skeleton key’ to the system, they turn legitimate Remote Monitoring and Management (RMM) software into a persistent backdoor.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attack unfolds in two distinct waves, where the threat actors leverage fake invitation notifications to steal victim credentials, and then leverage those pilfered credentials to deploy RMM tools to establish persistent access.

Cybersecurity

The bogus emails are disguised as an invitation from a legitimate platform called Greenvelope, and aim to trick recipients into clicking on a phishing URL that’s designed to harvest their Microsoft Outlook, Yahoo!, AOL.com login information. Once this information is obtained, the attack moves to the next phase.

Specifically, this involves the threat actor registering with LogMeIn using the compromised email to generate RMM access tokens, which are then deployed in a follow-on attack through an executable named “GreenVelopeCard.exe” to establish persistent remote access to victim systems.

The binary, signed with a valid certificate, contains a JSON configuration that acts as a conduit to silently install LogMeIn Resolve (formerly GoTo Resolve) and connect to an attacker-controlled URL without the victim’s knowledge.

With the RMM tool now deployed, the threat actors weaponize the remote access to alter its service settings so that it runs with unrestricted access on Windows. The attack also establishes hidden scheduled tasks to automatically launch the RMM program even if it’s manually terminated by the user.

To counter the threat, it’s advised that organizations monitor for unauthorized RMM installations and usage patterns.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «microsoft flags multi stage aitm phishing and bec attacks targeting energy Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
  • Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
  • ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
  • Filling the Most Common Gaps in Google Workspace Security
  • Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
  • SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
  • Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
  • Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Copyright © TheCyberSecurity.News, All Rights Reserved.