CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Phishing Campaign Deploys LogMeIn RMM for Persistent Access

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A phishing campaign leverages stolen credentials to deploy LogMeIn RMM software for persistent remote access. The attack involves two phases: credential theft via fake Greenvelope invitations and subsequent RMM deployment using compromised accounts. The attackers use the legitimate RMM tool to maintain access, altering service settings and creating hidden scheduled tasks to ensure persistence.

Timeline

  1. 23.01.2026 13:18 1 articles · 23h ago

    Phishing Campaign Deploys LogMeIn RMM for Persistent Access

    A phishing campaign leverages stolen credentials to deploy LogMeIn RMM software for persistent remote access. The attack involves two phases: credential theft via fake Greenvelope invitations and subsequent RMM deployment using compromised accounts. The attackers use the legitimate RMM tool to maintain access, altering service settings and creating hidden scheduled tasks to ensure persistence.

    Show sources

Information Snippets