CyberheistNews Vol 16 #04 | January twenty seventh, 2026
The Skeleton Key: How Attackers Weaponize Trusted RMM Instruments for Backdoor Entry
KnowBe4 Menace Labs not too long ago examined a classy dual-vector marketing campaign that demonstrates the real-world exploitation chain following credential compromise.
This isn’t a standard virus assault. As an alternative of deploying customized viruses, attackers are bypassing safety perimeters by weaponizing the mandatory IT instruments that directors belief. By stealing a “skeleton key” to the system, they flip official Distant Monitoring and Administration (RMM) software program right into a persistent backdoor.
Phishing Assault Abstract
- Vector and Kind: E mail Phishing / Twin-vector assault that strikes from credential harvesting to full system takeover
- Strategies: model impersonation, credential harvesting, RMM deployment
- Bypassed SEG detection: Sure
- Targets: Organizations globally
The Two-Wave Assault Technique
This marketing campaign operates in two distinct waves: first by harvesting credentials via faux invitation notifications, then weaponizing these credentials to deploy official RMM software program that establishes persistent backdoor entry to sufferer methods.
Wave 1: Credential Harvesting
The assault begins with a phishing e-mail disguised as a Greenvelope invitation. As a result of Greenvelope is a official service used for company occasions and weddings, the “Social Engineering Indicators” are refined. Victims who click on the invitation are directed to a extremely convincing spoofed login web page designed to seize their credentials.
Wave 2: RMM Deployment
For the attacker, a legitimate password shouldn’t be the tip objective—it’s the supply mechanism. As soon as credentials are secured, the risk actors generate official RMM entry tokens. These tokens are then deployed in follow-on assaults via a file known as “GreenVelopeCard[.]exe” to ascertain persistent distant entry to sufferer methods.
[CONTINUED] Weblog submit with hyperlinks and intensive screenshots:
https://weblog.knowbe4.com/the-skeleton-key-how-attackers-weaponize-trusted-rmm-tools-for-backdoor-access
[Live Demo] Ridiculously Straightforward AI-Powered Safety Consciousness Coaching and Phishing
Phishing and social engineering stay the #1 cyber risk to your group, with 68% of information breaches brought on by human error. Your safety group wants a simple method to ship personalised coaching—that is exactly what our AI Protection Brokers present.
Be a part of us for a demo showcasing KnowBe4’s modern method to human threat administration with agentic AI that delivers personalised, related and adaptive safety consciousness coaching with minimal admin effort.
See how straightforward it’s to coach and phish your customers with KnowBe4’s HRM+ platform:
- NEW! Deepfake Coaching Content material – Generate hyperrealistic deepfakes of your personal executives to organize customers to identify AI-driven manipulation and deepfakes
- SmartRisk Agent™ – Generate actionable information and metrics that can assist you decrease your group’s human threat rating
- Template Generator Agent – Create convincing phishing simulations, together with Callback Phishing, that mimic actual threats. The Really useful Touchdown Pages Agent then suggests applicable touchdown pages primarily based on AI-generated templates
- Automated Coaching Agent – Routinely determine high-risk customers and assign personalised coaching
- Information Refresher Agent and Coverage Quizzes Agent – Reinforce your safety program and organizational insurance policies
See how these highly effective AI-driven options work collectively to dramatically cut back your group’s threat whereas saving your group worthwhile time.
Date/Time: Wednesday, February 4 @ 2:00 PM (ET)
Save My Spot:
https://information.knowbe4.com/kmsat-demo-2?partnerref=CHN
New Phishing Marketing campaign Spreads By way of LinkedIn Feedback
A widespread phishing marketing campaign is focusing on LinkedIn customers by posting feedback on customers’ posts, BleepingComputer studies.
Menace actors are utilizing bots to submit the feedback, which impersonate LinkedIn itself and inform the person that their account has been restricted as a consequence of coverage violations. The feedback include hyperlinks to supposedly enable the person to attraction the restriction.
“These posts falsely declare that the person has ‘engaged in actions that aren’t in compliance’ with the platform and that their account has been ‘quickly restricted’ till they go to the required hyperlink within the remark,” BleepingComputer says.
“The fabricated reply bearing the LinkedIn brand…seems pretty convincing relying on how viewers are interacting with the feedback space and on what machine.”
These hyperlinks result in convincingly spoofed LinkedIn login portals designed to steal customers’ Google, Microsoft or Apple credentials. A number of the assaults are notably troublesome to identify as a result of they use LinkedIn’s official URL shortener, which replaces the suspicious-looking phishing hyperlink with a brief “lnkd.in” URL.
A LinkedIn spokesperson informed BleepingComputer that the corporate is working to take motion towards this marketing campaign, including, “It is necessary to notice that LinkedIn doesn’t and won’t talk coverage violations to our members via public feedback, and we encourage our members to make a report in the event that they encounter this suspicious habits. This fashion we are able to evaluate and take the suitable motion.”
BleepingComputer notes, “Customers ought to stay vigilant and keep away from interacting with feedback, replies or non-public messages that seem to impersonate LinkedIn and urge recipients to click on exterior hyperlinks.”
Warn your customers. Weblog submit with hyperlinks:
https://weblog.knowbe4.com/new-phishing-campaign-spreads-via-linkedin-comments
Essential Capabilities When Evaluating Built-in Cloud E mail Safety
E mail continues to be the #1 manner cybercriminals get into your group. Daily, your customers face threats like credential phishing, enterprise e-mail compromise (BEC), ransomware and unintentional information loss — all aimed immediately at their inboxes. And in the event you’re counting on conventional, gateway-based e-mail safety to cease these threats, you are leaving your group insecure.
Trendy assaults have advanced. Your defenses have to evolve, too.
This whitepaper, Essential Capabilities When Evaluating Built-in Cloud E mail Safety, is a must-read for IT and Safety Operations (SecOps) groups trying to shut e-mail safety gaps in Microsoft 365, Google Workspace and different cloud-first environments.
What’s Inside:
- Core Menace Safety Capabilities: Look past the fundamentals. Get readability on the best way to cease superior threats that slip via conventional defenses — together with AI-driven phishing assaults, payload-less BEC and focused malware.
- Outbound Safety and Knowledge Loss Prevention: It is not nearly what will get in. Learn to stop delicate information from leaking out, whether or not via misdirected emails, insider errors or malicious exfiltration makes an attempt.
- Visibility, Administration and Reporting: Safety with out visibility is simply guesswork. Discover out why detailed logging, person habits insights and centralized reporting are non-negotiable for in the present day’s SecOps groups.
- Cloud-Native Structure and Integrations: Legacy bolt-ons gradual you down. Uncover why a real cloud-native platform — one which integrates seamlessly along with your present stack — is vital for efficiency, scale and ease of use.
Report: Scammers Stole $17 Billion Price of Crypto Final Yr
Scammers stole an estimated $17 billion value of cryptocurrency in 2025, in response to a brand new report from Chainalysis. Notably, the report discovered that AI-assisted scams stole 4.5 occasions more cash than scams that did not leverage AI.
“Our evaluation reveals that, on common, scams with on-chain hyperlinks to AI distributors extract $3.2 million per operation in comparison with $719,000 for these with out an on-chain hyperlink — 4.5 occasions extra income per rip-off,” the researchers write.
“These AI-related operations additionally show considerably better time-weighed effectivity….These metrics recommend each greater operational effectivity and doubtlessly broader sufferer attain.
“The elevated transaction quantity signifies that AI is enabling scammers to succeed in and handle extra victims concurrently, a development according to the industrialization of fraud we have been monitoring. In distinction, the elevated rip-off quantity means that AI is likewise making scams extra persuasive.”
These scams are additionally pushed by refined phishing kits that enable unskilled risk actors to launch industrial-scale fraud operations.
“Many of those campaigns have a social media angle, on condition that such platforms present entry to hundreds of thousands of customers, and are thus prime targets for sending automated messages,” the report says.
“In such circumstances, scammers might purchase bulk social media profiles and use SMS and phishing kits to speak. The fabric affect of this large-scale industrialization can’t be understated. Scams leveraging these phishing kits are 688 occasions more practical in greenback phrases and 4 occasions more practical in common transaction measurement than common scams.
“Scams that purchase bulk social media accounts are likewise 238 occasions more practical in greenback phrases and two occasions more practical in common transaction worth in comparison with common scams.”
KnowBe4 empowers your workforce to make smarter safety selections each day. Over 70,000 organizations worldwide belief the KnowBe4 HRM+ platform to strengthen their safety tradition and cut back human threat.
Weblog submit with hyperlinks:
https://weblog.knowbe4.com/report-scammers-stole-17-billion-worth-of-crypto-last-year
Phishing Safety Take a look at: Free Anti-Phishing Device
Do you know that 91% of profitable information breaches began with a spear phishing assault? Discover out what proportion of your staff are Phish-prone™ along with your free Phishing Safety Take a look at. Plus, see the way you stack up towards your friends with the brand new phishing Business Benchmarks!
IT professionals have realized that simulated phishing exams are urgently wanted as an extra safety layer. As we speak, phishing your personal customers is simply as necessary as having an antivirus and a firewall. It’s a enjoyable and an efficient cybersecurity greatest observe to patch your final line of protection: USERS.
Why? If you happen to do not do it your self, the dangerous actors will.
This is the way it works:
- Instantly begin your take a look at for as much as 100 customers (no want to speak to anybody)
- Choose from 20+ languages and customise the phishing take a look at template primarily based in your atmosphere
- Select the touchdown web page your customers see after they click on
- Present customers which purple flags they missed, or a 404 web page
- Get a PDF emailed to you in 24 hours along with your Phish-prone % and charts to share with administration
- See how your group compares to others in your trade
The Phish-prone Proportion is often greater than you count on and is nice ammo to get finances. Begin phishing your customers now. Fill out the shape, and get began instantly!
Signal Up:
https://information.knowbe4.com/phishing-security-test-em-chn
Let’s keep protected on the market.
Heat regards,
Stu Sjouwerman, SACP
Government Chairman
KnowBe4, Inc.
PS: [See It here First] NEW Infographic: People + AI: Higher Than Your SEG:
https://www.knowbe4.com/hubfs/People-Plus-AI-Higher-Than-SEG-Infographic_en-US.pdf
PPS: My new e book Agent-Powered Progress is a Nationwide Bestseller! You need to get your personal copy and inform your advertising and marketing group to get theirs:
https://stu-sjouwerman.multiscreensite.com/
Quotes of the Week
“Act as if what you do makes a distinction. It does.”
– William James – Thinker (1842 – 1910)
“There may be nothing so ineffective as doing effectively that which shouldn’t be performed in any respect.”
– Peter Drucker – Administration Guide (1909 – 2005)
You may learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-16-04-the-skeleton-key-how-attackers-weaponize-trusted-rmm-tools-for-backdoor-access
Safety Information
Weaponized AI Instruments Are Resulting in Industrial-Scale Cybercrime
Weaponized AI instruments have helped industrialize cybercrime, giving unskilled risk actors entry to platforms that may launch refined assaults, in response to a brand new report from Group-IB.
“Not like earlier waves of cybercrime, AI adoption by risk actors has been strikingly quick,” the researchers write. “AI is now firmly embedded as core infrastructure all through the legal ecosystem slightly than an occasional exploit.
“AI crimeware usually falls into three predominant classes: LLM exploitation, phishing and social engineering automation, and malware and tooling. These darkish net choices are inexpensive and sometimes bundled collectively to make them extra engaging to potential patrons.”
AI instruments will help risk actors at each stage of an assault, resulting in quicker and extra superior intrusions.
“Whereas phishing kits made fraud extra accessible and scalable by reducing the technical threshold, weaponized AI goes additional,” Group-IB says. “It compresses your complete assault lifecycle — from preliminary reconnaissance and weaponization to sustaining persistence inside compromised methods.
“What’s extra, it scales effortlessly and tailors assaults with precision, making it attainable for even inexperienced risk actors — with restricted technical and monetary sources — to launch refined, high-impact campaigns towards even the biggest organizations.
“Adoption of GenAI is equally useful for extra refined and superior actors, offering alternatives for quicker, extra scalable and evasive operations.” Notably, these legal platforms are professionally made and solely price about $30 monthly. “Novices now have straightforward, inexpensive, subscription-based entry to Deepfake-as-a-Service, automated phishing package turbines and DarkLLMs fine-tuned on malicious datasets,” the researchers write.
“Distributors usually mimic facets of official SaaS companies—from pricing tiers to common updates and buyer help—and bundle services to reinforce their capabilities and make them extra engaging to potential patrons. These darkish net choices are inexpensive, versatile and tailor-made to completely different use circumstances and marketing campaign necessities.”
KnowBe4 empowers your workforce to make smarter safety selections each day.
Group-IB has the story:
https://www.group-ib.com/media-center/press-releases/weaponised-ai-cybercrime/
[OUCH] Report: 4 in 10 Workers Have By no means Obtained Cybersecurity Coaching
Forty p.c of staff have by no means obtained cybersecurity coaching, in response to a brand new report from Yubico. That quantity rises to just about 60% for workers working for small companies. The report surveyed 18,000 employed adults from the U.S., the UK, Australia, India, Japan, France, Germany, Singapore and Sweden.
“Our analysis finds that 4 in 10 (40%) staff have by no means obtained coaching on cybersecurity in any kind,” Yubico says. “Moreover, 44% of corporations wait longer than three-five months to replace their cybersecurity insurance policies. These two statistics recommend that near half of staff have been by no means launched to their firm’s safety pointers within the first place, and roughly half of those who got cybersecurity coaching are working on outdated information.
“With new assault methods rising on a near-constant foundation and the rise of AI-based threats, inconsistent cybersecurity coaching habits go away many organizations and their workforce in a continuing state of vulnerability.”
Moreover, Yubico warns that AI instruments are making phishing assaults extra convincing, and 70% of respondents could not inform the distinction between an AI-generated phishing message and a human-written one.
“We discovered that of those that have been tricked by phishing messages, 34% of respondents stated the rationale they fell for the ruse was that it appeared to come back from a trusted supply,” the report says. “With AI’s capability to cater to particular people and draw from huge quantities of information, this discovering exhibits how AI is permitting most of these threats to develop and develop into extra profitable.”
Yubico concludes that staff must be made conscious of evolving cybersecurity threats in an effort to thwart these assaults.
“Academic applications should emphasize the significance of each skilled and private cybersecurity, giving staff a deep understanding of how private habits can affect office safety,” the report says. “Common coaching classes are important in in the present day’s quickly altering risk panorama, and organizations ought to present a gentle stream of schooling on rising dangers, together with assessments to make sure information retention.”
Over 70,000 organizations worldwide belief the KnowBe4 HRM+ platform to strengthen their safety tradition and cut back human threat.
Cybersecurity Intelligence has the story:
https://www.cybersecurityintelligence.com/weblog/executive-cyber-vulnerability-is-a-growing-risk-9028.html
What KnowBe4 Prospects Say
“Bryan, a Completely happy New Yr to you and the employees. We’re very proud of each the KnowBe4 platform and the localized Japan help supplied. The system has the options and performance we have to improve our IS/Privateness tradition, an ongoing organizational objective of the Government Director.
“I needed to share with you my appreciation for 2 KnowBe4 Employees members who have been instrumental in our profitable implementation: Rika O. assisted with the subscription choice, citation and cost processing making these needed steps go easily and effectively.
“Marie I., our Buyer Success Supervisor, was extraordinarily useful in our preliminary setup & configuration of the platform. We have been capable of launch a Phishing Simulation in addition to an organizational-wide coaching course inside weeks of us inking the deal.
“We definitely are Completely happy Campers and look ahead to our utilization of KnowBe4 in 2026 & past.”
– T.G., Senior Operational & Tech Advisor Japan
“Thanks, up to now so good. Fairly good coaching classes with certainly one of your intro trainers, Monserrat!”
– Z.R., Chief Expertise Officer
Attention-grabbing Information Objects This Week
Cyberheist ‘Fave’ Hyperlinks
