HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Phishers Exploit LiveChat SaaS Support Tools to Harvest Credentials, Credit‑Card Data and MFA Codes

A new phishing campaign leverages the LiveChat customer‑support platform to impersonate brands like PayPal and Amazon, stealing login credentials, credit‑card details, MFA codes and other PII. Organizations that embed LiveChat must reassess third‑party risk and enforce stricter controls.

🛡️ LiveThreat™ Intelligence · 📅 March 16, 2026· 📰 cofense.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
cofense.com

Phishers Exploit LiveChat SaaS Support Tools to Harvest Credentials, Credit‑Card Data and MFA Codes

What Happened – Threat actors are using the LiveChat SaaS platform to host malicious chat widgets that impersonate well‑known brands (e.g., PayPal, Amazon). Victims receive phishing emails with a “View Transaction” link that redirects to a LiveChat page where a bot or fake agent solicits login credentials, credit‑card numbers, MFA codes and other PII.

Why It Matters for TPRM

  • LiveChat is a third‑party customer‑support service; compromise of its chat interface can expose data of any organization that embeds it.
  • Credential and payment‑card theft can lead to downstream fraud, account takeover, and regulatory penalties for the affected vendor.
  • The abuse demonstrates how SaaS support tools can be weaponized without a direct breach of the provider itself.

Who Is Affected – Financial services, e‑commerce retailers, SaaS vendors that embed LiveChat, and their customers.

Recommended Actions

  • Review contracts and security questionnaires for any LiveChat (or similar) integrations.
  • Verify that the provider enforces strict domain‑allow‑list controls and multi‑factor authentication for admin access.
  • Conduct phishing‑resilience training focused on chat‑widget lures and enforce URL‑verification policies.

Technical Notes – Attack vector: phishing emails → malicious LiveChat widget (hosted on lc.chat domain) → credential harvesting via chat bot or fake agent. No CVE disclosed; data types targeted include usernames, passwords, credit‑card numbers, MFA tokens and PII. Source: Cofense Intelligence

📰 Original Source
https://cofense.com/blog/livechat-abuse-how-phishers-are-exploiting-saas-support-tools-to-steal-sensitive-data

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.