Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Home/Threats/Threat Actors Phish with LogMeIn Resolve & Screen Abuse ScreenConnect
Threats

Threat Actors Phish with LogMeIn Resolve & Screen Abuse ScreenConnect

A sophisticated phishing campaign is actively targeting organizations across the United States, leveraging trusted remote monitoring and management (RMM) tools like LogMeIn Resolve and ScreenConnect...

Sarah simpson
Sarah simpson
April 7, 2026 3 Min Read
5 0

A sophisticated phishing campaign is actively targeting organizations across the United States, leveraging trusted remote monitoring and management (RMM) tools like LogMeIn Resolve and ScreenConnect to bypass security defenses and gain unauthorized access to victim systems, according to a recent analysis

The campaign appears to have begun as early as April 2025, with the bulk of malicious activity occurring between October and November of the same year.

In total, more than 80 organizations across multiple industry sectors in the US were affected. Attackers initiated contact through phishing emails — some sent from compromised third-party accounts belonging to known and trusted contacts, making the messages appear credible, while others came from completely unknown senders.

Many of these emails were designed to look like Punchbowl event invitations, carrying subject lines such as “SPECIAL INVITATION,” while others mimicked tender solicitation notices.

Each email contained a link pointing to attacker-controlled distribution sites that hosted legitimate LogMeIn Resolve installers preconfigured to register the victim’s device to an account fully owned and controlled by the attacker.

Sophos analysts and researchers identified and tracked this threat activity cluster as STAC6405.

Their ongoing investigation revealed that the campaign’s distribution infrastructure shifted repeatedly over time, with the threat actor rotating between themed landing pages — including one mimicking Microsoft Teams and another styled after Norton security software — possibly to tailor delivery based on user location or browser attributes.

A Norton-themed distribution website (Source - Sophos)
A Norton-themed distribution website (Source – Sophos)

The malicious installer files carried names carefully designed to appear routine, such as Invitation.exe, ContractAgreementToSign.exe, and statmtsPDF10.25.exe.

An example of one of the malicious lures (Source - Sophos)
An example of one of the malicious lures (Source – Sophos)

Once a victim executed the downloaded file, the attacker gained unattended remote access through the LogMeIn Resolve platform.

Following execution of the downloaded binary, LogMeIn Resolve is installed (Source - Sophos)
Following execution of the downloaded binary, LogMeIn Resolve is installed (Source – Sophos)

The installed agent wrote a configuration file to disk with a hard-coded relay domain controlled by the attacker and registered a Windows service using a unique ID tied to that specific configuration.

In most observed cases, the attack stopped at this point — threat actors appeared to remain idle after gaining initial access, a pattern commonly linked to initial access broker (IAB) operations, where stolen access is quietly sold on criminal marketplaces for further exploitation.

Multi-Stage Payload Delivery

In two incidents, however, the threat actors moved to a second stage very quickly. In the first case, they exploited a pre-existing installation of ScreenConnect — already running on the victim machine — to download a ZIP archive packed with the HeartCrypt Packer-as-a-Service tool.

The archive held two files: HideMouse.exe, a utility that replaces the visible mouse cursor with a transparent one to conceal remote on-screen activity from the user, and 87766713.exe, a piece of malware that Sophos researchers assessed as behaviorally similar to ValleyRAT.

Once executed, the infostealer sat idle for four to nine minutes — a deliberate delay designed to bypass sandbox analysis and heuristic detection tools — before injecting code into csc.exe, a legitimate Microsoft binary regularly abused as a living-off-the-land binary (LOLbin).

The malware then connected to a command-and-control server and began harvesting browser-stored credentials, session tokens, cryptocurrency wallet data, and system details. An embedded encrypted payload was decrypted at runtime using TripleDES cryptography.

In the second incident, the downloaded binary launched a ScreenConnect client as a service alongside a Java-based remote access tool, and the attacker began enumerating firewall rules before Sophos and the affected organization successfully contained the breach.

Organizations should restrict software installations to an approved list, enforce strong credential hygiene through secure password managers or passkeys, and remove RMM tools like LogMeIn if they are not needed for daily business use.

Unauthorized RMM tools should also be blocked through application control policies. Any URLs and indicators of compromise associated with this campaign should be blocked promptly across all network entry points.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Iran-Linked Hackers Target Microsoft 365 in Launch Password

Next Post

Critical Android Zero-Interaction Flaw Enables DoS

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
RansomHouse Claims Access to Trellix Source Code Breach Parts
May 8, 2026
PCPJack Worm Targets Docker, Kubernetes, Redis Credential
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us