Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求很明确,不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。 首先,我得仔细阅读文章内容。文章主要讲的是网络安全研究人员披露了一个新的双阶段网络攻击活动。攻击者利用被盗的凭证部署合法的远程监控和管理软件,从而获得对受损主机的远程持续访问。 接下来,攻击分为两个阶段:第一阶段是通过伪装成来自Greenvelope平台的邀请通知来窃取受害者的凭证;第二阶段则利用这些凭证注册LogMeIn,生成RMM访问令牌,并通过一个可执行文件部署到受害者系统中,建立持续的远程访问。 攻击者还利用合法证书签名的二进制文件,在受害者不知情的情况下安装LogMeIn Resolve,并连接到攻击者控制的URL。此外,他们还会修改服务设置,确保RMM工具在Windows上以无限制权限运行,并创建隐藏的任务来自动启动该程序。 最后,文章建议组织监测未经授权的RMM安装和使用模式。 现在我需要将这些信息浓缩到100字以内。重点包括:双阶段攻击、利用被盗凭证、部署合法RMM软件、伪装成Greenvelope邀请、窃取登录信息、注册LogMeIn生成令牌、安装并建立远程访问、修改服务设置和创建隐藏任务。建议部分可以简化为监测异常活动。 综合以上信息,我可以组织语言如下:研究人员披露了新的双阶段网络攻击活动。攻击者利用被盗凭证部署合法远程监控管理软件(RMM),通过伪装成Greenvelope邀请窃取登录信息后,在受害者系统中安装LogMeIn Resolve并建立持续访问。该软件随后被用于修改服务设置以获得无限制权限,并创建隐藏任务确保程序自动运行。建议组织监测异常RMM活动。 </think> 研究人员披露了新的双阶段网络攻击活动。攻击者利用被盗凭证部署合法远程监控管理软件(RMM),通过伪装成Greenvelope邀请窃取登录信息后,在受害者系统中安装LogMeIn Resolve并建立持续访问。该软件随后被用于修改服务设置以获得无限制权限,并创建隐藏任务确保程序自动运行。建议组织监测异常RMM活动。 2026-1-23 11:18:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

Email Security / Endpoint Security

Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts.

"Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust," KnowBe4 Threat Labs researchers Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke said. "By stealing a 'skeleton key' to the system, they turn legitimate Remote Monitoring and Management (RMM) software into a persistent backdoor."

The attack unfolds in two distinct waves, where the threat actors leverage fake invitation notifications to steal victim credentials, and then leverage those pilfered credentials to deploy RMM tools to establish persistent access.

Cybersecurity

The bogus emails are disguised as an invitation from a legitimate platform called Greenvelope, and aim to trick recipients into clicking on a phishing URL that's designed to harvest their Microsoft Outlook, Yahoo!, AOL.com login information. Once this information is obtained, the attack moves to the next phase.

Specifically, this involves the threat actor registering with LogMeIn using the compromised email to generate RMM access tokens, which are then deployed in a follow-on attack through an executable named "GreenVelopeCard.exe" to establish persistent remote access to victim systems.

The binary, signed with a valid certificate, contains a JSON configuration that acts as a conduit to silently install LogMeIn Resolve (formerly GoTo Resolve) and connect to an attacker-controlled URL without the victim's knowledge.

With the RMM tool now deployed, the threat actors weaponize the remote access to alter its service settings so that it runs with unrestricted access on Windows. The attack also establishes hidden scheduled tasks to automatically launch the RMM program even if it's manually terminated by the user.

To counter the threat, it's advised that organizations monitor for unauthorized RMM installations and usage patterns.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
如有侵权请联系:admin#unsafe.sh