Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
A new phishing campaign leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software, specifically LogMeIn Resolve, to maintain persistent unauthorized access on compromised systems. The attack begins with phishing emails impersonating legitimate invitations to steal Microsoft Outlook, Yahoo! , and AOL credentials. Using these credentials, attackers register with LogMeIn to generate RMM access tokens and silently install the RMM tool via a signed executable. The deployed RMM software is configured to run with unrestricted privileges and is made persistent through hidden scheduled tasks, allowing attackers continuous remote control. This technique bypasses traditional security defenses by weaponizing trusted IT administration tools rather than deploying custom malware. European organizations face risks of data exfiltration, espionage, and operational disruption. Monitoring for unauthorized RMM installations and anomalous usage is critical for defense. The threat is medium severity due to the need for credential theft but high impact if successful.
AI Analysis
Technical Summary
This threat involves a sophisticated dual-vector phishing campaign that exploits stolen user credentials to deploy legitimate Remote Monitoring and Management (RMM) software—LogMeIn Resolve (formerly GoTo Resolve)—as a persistent backdoor on victim systems. The attack starts with phishing emails masquerading as invitations from a legitimate platform called Greenvelope, designed to harvest login credentials for popular email services such as Microsoft Outlook, Yahoo!, and AOL. Once credentials are compromised, attackers use them to register with LogMeIn, generating RMM access tokens that enable remote management capabilities. The attackers then deploy a signed executable named "GreenVelopeCard.exe," which contains a JSON configuration to silently install the LogMeIn RMM client and connect it to attacker-controlled infrastructure without user awareness. The RMM software is configured to run with unrestricted system privileges, allowing attackers to manipulate system settings and maintain persistence by creating hidden scheduled tasks that relaunch the RMM client even if terminated. This approach leverages trusted administrative tools to evade detection by traditional antivirus and endpoint security solutions, as the software itself is legitimate and signed. The campaign highlights a shift from deploying custom malware to abusing legitimate IT management tools to maintain stealthy, persistent access. Detection is complicated by the use of valid certificates and legitimate software, requiring organizations to monitor for anomalous RMM deployments and usage patterns. No known exploits in the wild have been reported beyond this campaign, but the technique poses significant risks if adopted widely.
Potential Impact
For European organizations, this threat poses substantial risks including unauthorized persistent remote access, data theft, espionage, and potential disruption of IT operations. The use of legitimate RMM software complicates detection and response, increasing the likelihood of prolonged undetected intrusions. Sensitive data confidentiality and system integrity are at risk, especially in sectors with high-value intellectual property or critical infrastructure. Attackers gaining persistent access can move laterally within networks, escalate privileges, and deploy additional payloads or ransomware. The operational availability of systems may be compromised if attackers manipulate or disable security controls. Given the reliance on stolen credentials, organizations with weak credential hygiene or insufficient multi-factor authentication (MFA) are particularly vulnerable. The campaign’s stealthy nature may delay incident response, increasing potential damage and regulatory exposure under GDPR and other European data protection laws. The threat also underscores the need for stringent controls around RMM tool deployment and monitoring, especially in managed service provider (MSP) environments common in Europe.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on credential protection and RMM monitoring. Enforce strong multi-factor authentication (MFA) on all email and RMM platform accounts to prevent unauthorized access via stolen credentials. Conduct regular phishing awareness training tailored to recognize sophisticated invitation-style phishing emails. Implement strict access controls and least privilege principles for RMM software usage, limiting installation and execution rights to authorized personnel only. Continuously monitor network and endpoint telemetry for anomalous RMM installations, unusual service configurations, and hidden scheduled tasks indicative of persistence mechanisms. Employ application allowlisting to restrict execution of unauthorized binaries, including suspicious executables like "GreenVelopeCard.exe." Integrate threat intelligence feeds to detect known phishing URLs and malicious domains associated with this campaign. Regularly audit RMM tool configurations and access logs for unauthorized changes or connections to unknown endpoints. Establish incident response playbooks specifically addressing abuse of legitimate IT tools. Finally, segment networks to contain potential lateral movement from compromised hosts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
Description
A new phishing campaign leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software, specifically LogMeIn Resolve, to maintain persistent unauthorized access on compromised systems. The attack begins with phishing emails impersonating legitimate invitations to steal Microsoft Outlook, Yahoo! , and AOL credentials. Using these credentials, attackers register with LogMeIn to generate RMM access tokens and silently install the RMM tool via a signed executable. The deployed RMM software is configured to run with unrestricted privileges and is made persistent through hidden scheduled tasks, allowing attackers continuous remote control. This technique bypasses traditional security defenses by weaponizing trusted IT administration tools rather than deploying custom malware. European organizations face risks of data exfiltration, espionage, and operational disruption. Monitoring for unauthorized RMM installations and anomalous usage is critical for defense. The threat is medium severity due to the need for credential theft but high impact if successful.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated dual-vector phishing campaign that exploits stolen user credentials to deploy legitimate Remote Monitoring and Management (RMM) software—LogMeIn Resolve (formerly GoTo Resolve)—as a persistent backdoor on victim systems. The attack starts with phishing emails masquerading as invitations from a legitimate platform called Greenvelope, designed to harvest login credentials for popular email services such as Microsoft Outlook, Yahoo!, and AOL. Once credentials are compromised, attackers use them to register with LogMeIn, generating RMM access tokens that enable remote management capabilities. The attackers then deploy a signed executable named "GreenVelopeCard.exe," which contains a JSON configuration to silently install the LogMeIn RMM client and connect it to attacker-controlled infrastructure without user awareness. The RMM software is configured to run with unrestricted system privileges, allowing attackers to manipulate system settings and maintain persistence by creating hidden scheduled tasks that relaunch the RMM client even if terminated. This approach leverages trusted administrative tools to evade detection by traditional antivirus and endpoint security solutions, as the software itself is legitimate and signed. The campaign highlights a shift from deploying custom malware to abusing legitimate IT management tools to maintain stealthy, persistent access. Detection is complicated by the use of valid certificates and legitimate software, requiring organizations to monitor for anomalous RMM deployments and usage patterns. No known exploits in the wild have been reported beyond this campaign, but the technique poses significant risks if adopted widely.
Potential Impact
For European organizations, this threat poses substantial risks including unauthorized persistent remote access, data theft, espionage, and potential disruption of IT operations. The use of legitimate RMM software complicates detection and response, increasing the likelihood of prolonged undetected intrusions. Sensitive data confidentiality and system integrity are at risk, especially in sectors with high-value intellectual property or critical infrastructure. Attackers gaining persistent access can move laterally within networks, escalate privileges, and deploy additional payloads or ransomware. The operational availability of systems may be compromised if attackers manipulate or disable security controls. Given the reliance on stolen credentials, organizations with weak credential hygiene or insufficient multi-factor authentication (MFA) are particularly vulnerable. The campaign’s stealthy nature may delay incident response, increasing potential damage and regulatory exposure under GDPR and other European data protection laws. The threat also underscores the need for stringent controls around RMM tool deployment and monitoring, especially in managed service provider (MSP) environments common in Europe.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on credential protection and RMM monitoring. Enforce strong multi-factor authentication (MFA) on all email and RMM platform accounts to prevent unauthorized access via stolen credentials. Conduct regular phishing awareness training tailored to recognize sophisticated invitation-style phishing emails. Implement strict access controls and least privilege principles for RMM software usage, limiting installation and execution rights to authorized personnel only. Continuously monitor network and endpoint telemetry for anomalous RMM installations, unusual service configurations, and hidden scheduled tasks indicative of persistence mechanisms. Employ application allowlisting to restrict execution of unauthorized binaries, including suspicious executables like "GreenVelopeCard.exe." Integrate threat intelligence feeds to detect known phishing URLs and malicious domains associated with this campaign. Regularly audit RMM tool configurations and access logs for unauthorized changes or connections to unknown endpoints. Establish incident response playbooks specifically addressing abuse of legitimate IT tools. Finally, segment networks to contain potential lateral movement from compromised hosts.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html","fetched":true,"fetchedAt":"2026-01-23T20:40:38.654Z","wordCount":889}
Threat ID: 6973dcc84623b1157c62f84a
Added to database: 1/23/2026, 8:40:40 PM
Last enriched: 1/23/2026, 8:41:32 PM
Last updated: 1/24/2026, 7:58:54 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-23
MediumCISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
LowIn Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
MediumRestless Spirit: New Attacks on Russian Companies
MediumTracking the VS Code Tasks Infection Vector
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.