Attackers Abuse LiveChat to Phish Credit Card and Personal Data

Related

Amazon SES Increasingly Abused in Phishing to Evade Detection

What happened Threat actors are exploiting Amazon Simple Email Service...

Robinhood Account Creation Flaw Abused to Send Phishing Emails

What happened Threat actors exploited a flaw in Robinhood's account...

NASA Employees Duped in Chinese Phishing Scheme Targeting Defense Software

What happened NASA's Office of Inspector General has released details...

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

What happened A law enforcement operation in early March seized...

European Commission Investigating Breach After Amazon Cloud Account Hack

What happened The European Commission is investigating a breach after...

Share

What happened

Attackers are abusing the LiveChat customer support platform in a phishing campaign that impersonates major brands like Amazon and PayPal to steal sensitive user data. Researchers from Cofense Phishing Defense Center (PDC) identified that threat actors initiate real-time conversations with victims through chat interfaces, creating a sense of trust and urgency. During these interactions, victims are tricked into providing account credentials, credit card details, multi-factor authentication (MFA) codes, and other personally identifiable information (PII). The campaign relies on social engineering rather than malware, using legitimate-looking support conversations to extract data directly from users. Researchers noted that these tactics make phishing attacks harder to detect because they mimic genuine customer support experiences. 

Who is affected

Users interacting with fraudulent LiveChat sessions impersonating trusted brands such as Amazon and PayPal are affected, particularly those who provide sensitive personal or financial information during these conversations. 

Why CISOs should care

The campaign shows how attackers are shifting phishing techniques toward real-time, interactive channels that increase trust and reduce traditional detection signals associated with email-based attacks. 

3 practical actions

  1. Monitor customer support channels for abuse. Detect unauthorized or impersonated chat interactions targeting users. 
  2. Educate users on support-based phishing. Reinforce that legitimate support teams will not request sensitive data like MFA codes or full payment details. 
  3. Verify brand communication channels. Ensure official customer support endpoints are clearly defined and protected against impersonation. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts