Cybersecurity researchers uncovered a sophisticated two-stage phishing campaign that steals email credentials through fake Greenvelope invitation notifications, then uses those credentials to register LogMeIn RMM accounts and deploy remote access tools. Attackers distribute a signed executable that silently installs LogMeIn Resolve, modifies Windows service settings for unrestricted access, and creates hidden scheduled tasks for persistence. This approach weaponizes legitimate IT administration tools to bypass security perimeters, making detection more difficult than traditional malware.
Sort: