Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs

January 14, 2026

Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft

January 14, 2026

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

January 14, 2026
Facebook X (Twitter) Instagram
Wednesday, January 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs
Cyber Security

Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs

Team-CWDBy Team-CWDJanuary 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new wave of phishing-led intrusions abusing legitimate remote monitoring and management (RMM) tools has been documented, with attackers using fake PayPal alerts to gain both personal and corporate access.

The activity, documented in an advisory published by Cyberproof on Tuesday, marks a shift away from seasonal lures toward high-urgency financial themes, while highlighting how trusted remote access software continues to be weaponized to evade detection.

Earlier waves relied on decoy messages such as holiday party invitations, tax notices or document signing requests. The latest incidents instead exploit fake PayPal warnings designed to provoke immediate action.

From Personal Accounts to Corporate Footholds

CyberProof researchers examined six incidents across customer environments, including one case in which an employee’s personal PayPal account served as the initial entry point.

On January 5 2026, the company’s Managed Detection and Response (MDR) team identified suspicious activity that later escalated into corporate access.

The attack began with a fraudulent PayPal email, followed by phone-based social engineering. Posing as support staff, the attacker convinced the victim to install legitimate remote access software.

LogMeIn Rescue was deployed first, before the threat actor pivoted to AnyDesk to maintain access. No endpoint detection and response (EDR) alerts were triggered during the intrusion.

Read more on RMM tool abuse and defense: Remote Control Cybercrime: An RMM Protection Guide for MSPs

RMM Redundancy and Security Recommendations

For context, attackers using one RMM tool to install another is a pattern also noted recently in research from Broadcom.

This approach appears intended to reduce the likelihood of detection and possibly to cycle through trial licences to avoid expiration.

Artifacts from these attacks included multiple LogMeIn Rescue binaries and confirmation of an active remote session.

Persistence was achieved through a scheduled task and a startup shortcut disguised with a Gmail-style name. The tactic was designed to blend into regular system activity and avoid raising suspicion during routine checks.

“While the immediate motivation behind this campaign appears financial, the long-term risk is significant,” Cyberproof warned.

“Access gained through these RMM ‘backdoors’ can be sold to Advanced Persistent Threat (APT) actors, leading to full corporate compromise or ransomware deployment.”

To tackle similar threats, the cybersecurity firm recommended tightening phishing controls, restricting network access to common RMM ports and avoiding the exposure of remote services such as RDP.

It also urged organizations to maintain offline backups, assess the risks of third-party RMM tools, keep security software up to date and reinforce user training as part of a zero-trust security model.

Image credit: Samuel Boivin / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCriminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft
Team-CWD
  • Website

Related Posts

Cyber Security

CISA Flags Actively Exploited Gogs Vulnerability With No Patch

January 13, 2026
Cyber Security

WEF: Deepfake Face-Swapping Tools Are Creating Critical Risks

January 9, 2026
Cyber Security

GoBruteforcer Botnet Targets Linux Servers

January 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.