Urgent Alert: New “Greenvelope” Phishing Attack Installs Backdoor via LogMeIn

A new dual-vector cyber attack targets Las Vegas businesses using fake event invites to install rogue LogMeIn RMM tools. See the threat breakdown & defense plan.

 

🚨 URGENT SECURITY ALERT: Greenvelope Phishing Attack Installs LogMeIn Backdoor

Sophisticated “Living off the Land” attack bypasses traditional antivirus – Las Vegas hospitality sector at high risk

 

By Adam Lopez, CMIT Solutions of Las Vegas

Published: January 2026 | Threat Level: CRITICAL


Executive Summary: The “Trusted Tool” Trap

⚠️ URGENT SECURITY WARNING

A sophisticated new cyber campaign has been identified by threat researchers at KnowBe4. This is not a standard virus; it is a “Living off the Land” (LotL) attack that weaponizes legitimate IT software to bypass traditional antivirus defenses.

The Threat: Attackers are sending phishing emails disguised as invitations from the digital platform Greenvelope. If an employee clicks and enters credentials, the attackers do not just steal the password—they use it to deploy a legitimate instance of LogMeIn Resolve (formerly GoTo Resolve), granting them persistent, invisible remote control over your network.
Who is Affected: Any organization using Microsoft Outlook, Yahoo, or AOL for email is a target. In Las Vegas, where hospitality, entertainment, and legal industries rely heavily on digital event invitations (galas, conventions, corporate mixers), the “click rate” risk for this specific lure is dangerously high.

 

Technical Breakdown: Anatomy of the Attack

Unlike attacks that exploit a software bug (CVE), this campaign abuses logic and trust. Here are the specific Indicators of Compromise (IoCs) identifying this threat:

Attack Chain Breakdown:

đź“§ Attack Vector

Phishing email mimicking a “Greenvelope” event invitation (digital greeting card platform)

🔑 Credential Theft

Landing page harvests Outlook/Yahoo/AOL credentials through fake login form

đź’ľ Payload Dropper

A binary executable named GreenVelopeCard.exe is downloaded

âś“ Digital Signature

The binary is digitally signed with a valid certificate, tricking Windows into trusting it

đź”’ Persistence Mechanism

The malware silently installs LogMeIn Resolve using a JSON configuration file

It establishes Hidden Scheduled Tasks to relaunch the RMM tool automatically if terminated

Service settings are altered to run with Unrestricted Access (System Level)


Why This Matters to Las Vegas CEOs

This attack represents a shift in tradecraft. By using legitimate RMM (Remote Monitoring and Management) software, hackers are hiding in plain sight.

1. The “Shadow IT” Nightmare

Your antivirus likely won’t block LogMeIn because it is a legitimate tool used by millions of IT professionals. To a basic firewall, this traffic looks like normal business operations.

2. The “Event Capital” Vulnerability

Las Vegas is the convention capital of the world. Your staff likely receives dozens of legitimate digital invites weekly. Attackers know this. They are betting that your sales director or front-desk manager will click a “Greenvelope” link out of habit.

3. Total Network Compromise

Once the RMM is installed, attackers have “hands-on-keyboard” access. They can exfiltrate sensitive client data (gaming compliance data, legal files, guest lists) or deploy ransomware manually at a time of their choosing—often 2 AM on a holiday weekend.

 

Your 3-Step Defense-in-Depth Strategy

Since this attack uses valid credentials and valid software, standard “set it and forget it” security is insufficient. We recommend the following immediate actions based on the NIST Cybersecurity Framework:

1

Application Ring-Fencing (Zero Trust)

You must control what software is allowed to run. Implement Application Whitelisting (via ThreatLocker or similar tools) that blocks any RMM tool not explicitly approved by your IT department. Even if GreenVelopeCard.exe runs, it should be blocked from installing LogMeIn if that specific publisher isn’t on your allow-list.

2

Phishing-Resistant MFA

The attack starts with credential theft. Move beyond SMS-based 2-Factor Authentication. Implement FIDO2 Hardware Keys (YubiKeys) or certificate-based authentication. Even if an employee is tricked by the fake login page, they cannot give away the physical token required to log in.

3

Behavioral Monitoring (EDR/MDR)

Deploy Endpoint Detection and Response (EDR) agents that look for behavior, not just file signatures. A proper SOC (Security Operations Center) should trigger an immediate alarm if a scheduled task is created to launch a remote access tool, or if a non-admin user attempts to install system-level services.


How CMIT Solutions of Las Vegas Protects You

At CMIT Solutions, we specialize in distinguishing between “friend” and “foe” on your network.

🔍 RMM Audits

We scan your network to identify all remote access tools. If we didn’t install it, we remove it. No exceptions.

🎓 Security Training

We can simulate this exact “Greenvelope” attack to test your employees and educate them before the real hackers strike.

🛡️ 24/7 SOC Monitoring

Our team watches your endpoints around the clock. If a GreenVelopeCard.exe process starts, we kill it instantly.

 

Additional Las Vegas Cybersecurity Services:

âś“ Application Whitelisting (ThreatLocker) – Zero Trust security for Las Vegas gaming and hospitality
âś“ FIDO2 Hardware Key Deployment – Phishing-resistant MFA for executive teams
âś“ EDR/MDR Solutions – Behavioral monitoring and threat hunting
âś“ Simulated Phishing Campaigns – Test and train your staff with real-world scenarios
âś“ Compliance Support – PCI-DSS, HIPAA, Gaming Control Board requirements

“The Greenvelope attack is particularly dangerous for Las Vegas businesses because it exploits our culture. We’re an event-driven city—conferences, trade shows, galas happen daily. Employees are conditioned to click invitation links. That’s exactly what attackers are counting on. The only defense is layered security: technical controls, employee training, and 24/7 monitoring.”

— Adam Lopez, CMIT Solutions of Las Vegas

 

Don’t Let a Fake Party Invite Crash Your Business

Get a comprehensive vulnerability assessment and phishing simulation from Las Vegas’s cybersecurity specialists.

Contact Adam Lopez and the CMIT Las Vegas team today.

📞 702-725-2877

Request Emergency Security Assessment

cmitsolutions.com/lasvegas-nv-1206

 

Key Takeaways:

âš  Greenvelope phishing campaign weaponizes LogMeIn Resolve to bypass traditional antivirus
âš  Las Vegas at high risk – Convention capital culture makes employees prone to clicking invitation links
âś“ Deploy Application Whitelisting to block unauthorized RMM tools like LogMeIn
âś“ Implement FIDO2 hardware keys – Phishing-resistant MFA stops credential theft attacks
âś“ CMIT Solutions provides 24/7 SOC monitoring and simulated phishing training for Las Vegas businesses

 

Original threat research source: The Hacker News – KnowBe4 Report

 

Back to Blog

Share:

Related Posts

Las Vegas skyline — guide to choosing the best managed IT services in Las Vegas

Your 2025 Guide: Best Managed IT Services in Las Vegas | SMB Buyer’s Checklist

Your 2025 Guide: Choosing the Best Managed IT Services in Las Vegas…

Read More
From casino breaches to law firm hacks, here’s what 2025 looks like for Las Vegas cybersecurity — and how local SMBs can defend themselves.

Las Vegas Cybersecurity Threats in 2025

Las Vegas Cybersecurity Threats in 2025: What SMBs Must Know & How…

Read More

How Data Backup Protects You from Ransomware (Las Vegas SMB Guide)

How Data Backup Protects You from Ransomware: A Practical Guide for Las…

Read More