Attackers Abuse LiveChat to Phish Credit Card and Personal Data

Related

CISOs to Watch in Georgia’s Financial Services Sector

Georgia’s financial services sector includes banks, wealth management firms,...

ScreenConnect Vulnerability Exposes Machine Keys, Enables Session Hijacking

What happened ConnectWise disclosed a critical vulnerability in its ScreenConnect...

RondoDox Botnet Targets 174 Vulnerabilities Across Devices and Platforms

What happened Researchers at Bitsight identified a large-scale campaign involving...

11 Cybersecurity Vendors CISOs Must Check Out at RSA Conference 2026

Cybersecurity has shifted from reactive defense to continuous, intelligence-driven...

Share

What happened

Attackers are abusing the LiveChat customer support platform in a phishing campaign that impersonates major brands like Amazon and PayPal to steal sensitive user data. Researchers from Cofense Phishing Defense Center (PDC) identified that threat actors initiate real-time conversations with victims through chat interfaces, creating a sense of trust and urgency. During these interactions, victims are tricked into providing account credentials, credit card details, multi-factor authentication (MFA) codes, and other personally identifiable information (PII). The campaign relies on social engineering rather than malware, using legitimate-looking support conversations to extract data directly from users. Researchers noted that these tactics make phishing attacks harder to detect because they mimic genuine customer support experiences. 

Who is affected

Users interacting with fraudulent LiveChat sessions impersonating trusted brands such as Amazon and PayPal are affected, particularly those who provide sensitive personal or financial information during these conversations. 

Why CISOs should care

The campaign shows how attackers are shifting phishing techniques toward real-time, interactive channels that increase trust and reduce traditional detection signals associated with email-based attacks. 

3 practical actions

  1. Monitor customer support channels for abuse. Detect unauthorized or impersonated chat interactions targeting users. 
  2. Educate users on support-based phishing. Reinforce that legitimate support teams will not request sensitive data like MFA codes or full payment details. 
  3. Verify brand communication channels. Ensure official customer support endpoints are clearly defined and protected against impersonation. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.