4/1/2023 0 Comments Logmein automailer spam![]() If the security update is genuine, you will be advised about it when you login. Never use information provided in the email. Always visit the official website by entering the URL into the address bar or use your standard bookmarks. Any request sent by email to update security software or take other urgent actions should be treated as suspicious. There has been an increase in phishing attacks spoofing remote working tools in recent weeks such as LogMeIn, Microsoft Teams, Zoom, GoToMeeting, and Google Meet. If clicked, the user will be directed to a convincing spoofed LogMeIn URL where credentials are harvested. The anchor text used in the email masks the true site where the user will be directed. The email threatens subscription of the service will be suspended if the update is not applied. The emails include the LogMeIn logo and claim a new security update has been released to fix a new zero-day vulnerability that affects LogMeIn Central and LogMeIn Pro.Ī link is supplied in the email that appears to direct the recipient to the website and a warning is provided to add urgency to get the user to take immediate action. The emails claim a new update has been released for LogMeIn, with the messages appearing to have been sent by the legitimate LogMeIn Auto-Mailer. ![]() Remote workers are being targeted in a phishing campaign that spoofs LogMeIn, a popular cloud-based connectivity service used for remote IT management and collaboration. One campaign impersonates LogMeIn and the other exploits the COVID-19 pandemic to deliver a legitimate remote administration tool that allows attackers to take full control of a user’s device. Two new phishing campaigns have been identified targeting remote workers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |