Phishing Attack: Stolen Credentials Used to Install LogMeIn for Persistent Access! (2026)

A recent cybersecurity revelation has exposed a sophisticated dual-vector attack strategy, where hackers exploit stolen credentials to install legitimate Remote Monitoring and Management (RMM) software, effectively turning it into a backdoor for persistent remote access. This method, as highlighted by KnowBe4 Threat Labs researchers, is a clever twist on traditional virus deployment, as it leverages the very tools trusted by administrators to bypass security measures.

The attack is a two-step process. First, victims are lured into a trap through fake invitation emails, disguised as legitimate notifications from Greenvelope, a well-known platform. These emails contain phishing URLs designed to harvest login credentials for popular email services like Microsoft Outlook, Yahoo!, and AOL.com. Once the attackers have these credentials, the second phase begins.

The threat actors use the compromised email to register with LogMeIn, a popular RMM tool, and generate access tokens. These tokens are then deployed through an executable file named "GreenVelopeCard.exe" to establish persistent remote access to the victim's systems. What's more, the binary is signed with a valid certificate, making it even harder to detect. It contains a JSON configuration that silently installs LogMeIn Resolve and connects to an attacker-controlled URL, all without the victim's knowledge or consent.

But here's where it gets controversial: the RMM tool, once installed, is weaponized by the attackers. They alter its service settings to run with unrestricted access on Windows systems. Additionally, they set up hidden scheduled tasks, ensuring the RMM program automatically restarts even if the victim manually terminates it. This level of persistence gives the attackers a permanent foothold in the compromised system.

To mitigate this threat, organizations are advised to monitor for unauthorized RMM installations and keep a close eye on usage patterns. It's a delicate balance between trusting necessary IT tools and maintaining a vigilant eye for potential security breaches.

Have you ever wondered how hackers can turn legitimate software against us? Share your thoughts and experiences in the comments below. We'd love to hear your insights and experiences with cybersecurity.

Phishing Attack: Stolen Credentials Used to Install LogMeIn for Persistent Access! (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Duncan Muller

Last Updated:

Views: 6250

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.