{"id":1233,"date":"2026-01-23T15:37:28","date_gmt":"2026-01-23T21:37:28","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1233"},"modified":"2026-01-23T15:37:28","modified_gmt":"2026-01-23T21:37:28","slug":"greenvelope-logmein-rmm-phishing-attack-las-vegas","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/greenvelope-logmein-rmm-phishing-attack-las-vegas\/","title":{"rendered":"Urgent Alert: New &#8220;Greenvelope&#8221; Phishing Attack Installs Backdoor via LogMeIn"},"content":{"rendered":"<p>&nbsp;<\/p>\n<article><!-- Header Block --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"40\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td>\n<h1 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0;line-height: 1.3\">\ud83d\udea8 URGENT SECURITY ALERT: Greenvelope Phishing Attack Installs LogMeIn Backdoor<\/h1>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0;font-style: italic;border-left: 4px solid white;padding-left: 20px;line-height: 1.6\">Sophisticated &#8220;Living off the Land&#8221; attack bypasses traditional antivirus &#8211; Las Vegas hospitality sector at high risk<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Author Byline --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;color: #002f44;margin: 0;font-weight: 600\">By Adam Lopez, CMIT Solutions of Las Vegas<\/p>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 5px 0 0 0;font-style: italic\">Published: January 2026 | Threat Level: <span style=\"color: #ef3f37;font-weight: 900\">CRITICAL<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 30px 0\" \/>\n<p><!-- Executive Summary --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">Executive Summary: The &#8220;Trusted Tool&#8221; Trap<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Critical Warning Box --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 15px 0\">\u26a0\ufe0f URGENT SECURITY WARNING<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\">A sophisticated new cyber campaign has been identified by threat researchers at KnowBe4. This is not a standard virus; it is a <strong style=\"color: #ef9b37\">&#8220;Living off the Land&#8221; (LotL)<\/strong> attack that weaponizes legitimate IT software to bypass traditional antivirus defenses.<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"color: #2fb17e;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\" width=\"25%\">The Threat:<\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7\">Attackers are sending phishing emails disguised as invitations from the digital platform <strong style=\"color: #ef9b37\">Greenvelope<\/strong>. If an employee clicks and enters credentials, the attackers do not just steal the password\u2014they use it to deploy a legitimate instance of <strong>LogMeIn Resolve (formerly GoTo Resolve)<\/strong>, granting them persistent, invisible remote control over your network.<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #2fb17e;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Who is Affected:<\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7\">Any organization using Microsoft Outlook, Yahoo, or AOL for email is a target. In <strong style=\"color: #ef9b37\">Las Vegas<\/strong>, where hospitality, entertainment, and legal industries rely heavily on digital event invitations (galas, conventions, corporate mixers), the <strong>&#8220;click rate&#8221; risk for this specific lure is dangerously high.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Technical Breakdown --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">Technical Breakdown: Anatomy of the Attack<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.8;color: #002f44\">Unlike attacks that exploit a software bug (CVE), this campaign abuses <em>logic<\/em> and <em>trust<\/em>. Here are the specific <strong>Indicators of Compromise (IoCs)<\/strong> identifying this threat:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Attack Chain --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">Attack Chain Breakdown:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 15px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udce7 Attack Vector<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Phishing email mimicking a &#8220;Greenvelope&#8221; event invitation (digital greeting card platform)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udd11 Credential Theft<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Landing page harvests Outlook\/Yahoo\/AOL credentials through fake login form<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udcbe Payload Dropper<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">A binary executable named <code style=\"background-color: #f4f8fa;padding: 3px 8px;border-radius: 3px;color: #ef3f37;font-weight: 600\">GreenVelopeCard.exe<\/code> is downloaded<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\u2713 Digital Signature<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">The binary is <strong>digitally signed<\/strong> with a valid certificate, tricking Windows into trusting it<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udd12 Persistence Mechanism<\/strong><\/p>\n<p style=\"margin: 5px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">The malware silently installs <strong>LogMeIn Resolve<\/strong> using a JSON configuration file<\/p>\n<p style=\"margin: 5px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">It establishes <strong>Hidden Scheduled Tasks<\/strong> to relaunch the RMM tool automatically if terminated<\/p>\n<p style=\"margin: 5px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Service settings are altered to run with <strong>Unrestricted Access (System Level)<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Why This Matters --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">Why This Matters to Las Vegas CEOs<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">This attack represents a shift in tradecraft. By using legitimate RMM (Remote Monitoring and Management) software, <strong style=\"color: #ef3f37\">hackers are hiding in plain sight.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Risk Blocks --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">1. The &#8220;Shadow IT&#8221; Nightmare<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: white\">Your antivirus likely won&#8217;t block LogMeIn because <strong style=\"color: #ef9b37\">it is a legitimate tool<\/strong> used by millions of IT professionals. To a basic firewall, this traffic looks like normal business operations.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">2. The &#8220;Event Capital&#8221; Vulnerability<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: white\"><strong style=\"color: #ef9b37\">Las Vegas is the convention capital of the world.<\/strong> Your staff likely receives dozens of legitimate digital invites weekly. Attackers know this. They are betting that your sales director or front-desk manager will click a &#8220;Greenvelope&#8221; link out of habit.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">3. Total Network Compromise<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: white\">Once the RMM is installed, attackers have <strong style=\"color: #ef3f37\">&#8220;hands-on-keyboard&#8221; access<\/strong>. They can exfiltrate sensitive client data (gaming compliance data, legal files, guest lists) or deploy ransomware manually at a time of their choosing\u2014often 2 AM on a holiday weekend.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Defense Strategy --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">Your 3-Step Defense-in-Depth Strategy<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.8;color: #002f44\">Since this attack uses valid credentials and valid software, standard &#8220;set it and forget it&#8221; security is insufficient. We recommend the following immediate actions based on the <strong>NIST Cybersecurity Framework<\/strong>:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 1 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #2fb17e;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">1<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Application Ring-Fencing (Zero Trust)<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">You must control what software is allowed to run. Implement <strong>Application Whitelisting<\/strong> (via ThreatLocker or similar tools) that blocks <em>any<\/em> RMM tool not explicitly approved by your IT department. Even if <code style=\"background-color: white;padding: 3px 8px;border-radius: 3px;color: #ef3f37\">GreenVelopeCard.exe<\/code> runs, it should be blocked from installing LogMeIn if that specific publisher isn&#8217;t on your allow-list.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef9b37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">2<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Phishing-Resistant MFA<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">The attack starts with credential theft. Move beyond SMS-based 2-Factor Authentication. Implement <strong>FIDO2 Hardware Keys (YubiKeys)<\/strong> or certificate-based authentication. Even if an employee is tricked by the fake login page, they cannot give away the physical token required to log in.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef3f37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">3<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Behavioral Monitoring (EDR\/MDR)<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Deploy Endpoint Detection and Response (EDR) agents that look for <em>behavior<\/em>, not just file signatures. A proper SOC (Security Operations Center) should trigger an immediate alarm if a scheduled task is created to launch a remote access tool, or if a non-admin user attempts to install system-level services.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- CMIT Protection --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">How CMIT Solutions of Las Vegas Protects You<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">At CMIT Solutions, we specialize in distinguishing between <strong>&#8220;friend&#8221; and &#8220;foe&#8221;<\/strong> on your network.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Service Grid --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"20\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 25px;vertical-align: top\" bgcolor=\"#002f44\" width=\"33%\">\n<h4 style=\"color: #2fb17e;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin-top: 0\">\ud83d\udd0d RMM Audits<\/h4>\n<p style=\"margin: 0;line-height: 1.7;font-family: 'Avenir', Arial, sans-serif;color: white;font-size: 0.95em\">We scan your network to identify <em>all<\/em> remote access tools. If we didn&#8217;t install it, we remove it. No exceptions.<\/p>\n<\/td>\n<td style=\"padding: 25px;vertical-align: top\" bgcolor=\"#002f44\" width=\"33%\">\n<h4 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin-top: 0\">\ud83c\udf93 Security Training<\/h4>\n<p style=\"margin: 0;line-height: 1.7;font-family: 'Avenir', Arial, sans-serif;color: white;font-size: 0.95em\">We can simulate this exact &#8220;Greenvelope&#8221; attack to test your employees and educate them <em>before<\/em> the real hackers strike.<\/p>\n<\/td>\n<td style=\"padding: 25px;vertical-align: top\" bgcolor=\"#002f44\" width=\"33%\">\n<h4 style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin-top: 0\">\ud83d\udee1\ufe0f 24\/7 SOC Monitoring<\/h4>\n<p style=\"margin: 0;line-height: 1.7;font-family: 'Avenir', Arial, sans-serif;color: white;font-size: 0.95em\">Our team watches your endpoints around the clock. If a <code style=\"background-color: #001b28;padding: 2px 6px;border-radius: 3px\">GreenVelopeCard.exe<\/code> process starts, we kill it instantly.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Additional Services --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">Additional Las Vegas Cybersecurity Services:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"10\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;padding: 8px 0\"><strong>Application Whitelisting (ThreatLocker)<\/strong> &#8211; Zero Trust security for Las Vegas gaming and hospitality<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;padding: 8px 0\"><strong>FIDO2 Hardware Key Deployment<\/strong> &#8211; Phishing-resistant MFA for executive teams<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;padding: 8px 0\"><strong>EDR\/MDR Solutions<\/strong> &#8211; Behavioral monitoring and threat hunting<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;padding: 8px 0\"><strong>Simulated Phishing Campaigns<\/strong> &#8211; Test and train your staff with real-world scenarios<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;padding: 8px 0\"><strong>Compliance Support<\/strong> &#8211; PCI-DSS, HIPAA, Gaming Control Board requirements<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Expert Quote --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<p style=\"margin: 0 0 15px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;line-height: 1.7;color: #002f44;font-style: italic\">&#8220;The Greenvelope attack is particularly dangerous for Las Vegas businesses because it exploits our culture. We&#8217;re an event-driven city\u2014conferences, trade shows, galas happen daily. Employees are conditioned to click invitation links. That&#8217;s exactly what attackers are counting on. The only defense is layered security: technical controls, employee training, and 24\/7 monitoring.&#8221;<\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1em;color: #002f44;font-weight: 600\">\u2014 Adam Lopez, CMIT Solutions of Las Vegas<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- CTA Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"45\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td align=\"center\">\n<h2 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0\">Don&#8217;t Let a Fake Party Invite Crash Your Business<\/h2>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin: 0 0 15px 0;line-height: 1.6\">Get a comprehensive vulnerability assessment and phishing simulation from Las Vegas&#8217;s cybersecurity specialists.<\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0 0 25px 0;font-weight: 600\">Contact Adam Lopez and the CMIT Las Vegas team today.<\/p>\n<table style=\"margin: 25px auto\" border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-radius: 50px;padding: 5px 20px\" bgcolor=\"#002f44\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: bold;color: white\">\ud83d\udcde <a style=\"color: white;text-decoration: none\" href=\"tel:702-725-2877\">702-725-2877<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 25px 0\"><a style=\"background-color: #002f44;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Emergency Security Assessment<\/a><\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1em;margin: 25px 0 0 0\"><a style=\"color: white;text-decoration: underline\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Key Takeaways --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin-top: 0\">Key Takeaways:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"8\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"3%\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Greenvelope phishing campaign<\/strong> weaponizes LogMeIn Resolve to bypass traditional antivirus<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Las Vegas at high risk<\/strong> &#8211; Convention capital culture makes employees prone to clicking invitation links<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Deploy Application Whitelisting<\/strong> to block unauthorized RMM tools like LogMeIn<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Implement FIDO2 hardware keys<\/strong> &#8211; Phishing-resistant MFA stops credential theft attacks<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>CMIT Solutions provides 24\/7 SOC monitoring<\/strong> and simulated phishing training for Las Vegas businesses<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Source Attribution --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 0;font-style: italic\">Original threat research source: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/thehackernews.com\/2026\/01\/phishing-attack-uses-stolen-credentials.html\" target=\"_blank\" rel=\"nofollow noopener\">The Hacker News &#8211; KnowBe4 Report<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This isn&#8217;t just a virus; it&#8217;s a &#8216;Living off the Land&#8217; attack where hackers use your own trusted tools against you. A new campaign disguised as Greenvelope invitations is installing silent backdoors on corporate networks.<\/p>\n","protected":false},"author":1008,"featured_media":1232,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1232"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}