Phishers abuse LiveChat support tools to steal sensitive data in new SaaS-based tactic


A newly documented phishing campaign is abusing LiveChat-hosted pages to trick victims into handing over personal, financial, and authentication data through what looks like a legitimate support session. Cofense says the attacks use refund and order-confirmation lures, then move victims into live chat windows hosted under the lc.chat domain, where attackers harvest details in stages.

The tactic matters because it changes how phishing feels to the victim. Instead of sending users straight to a fake login page, the attackers place them inside a support-style conversation that looks more personal and more trustworthy. Cofense says that real-time interaction lowers suspicion and increases the chance that victims will share sensitive information.

Cofense documented two variants. One spoofed PayPal and promised a $200 refund through a “View Transaction Details” button. The other used a generic order-confirmation lure with a “View Update” link and no visible brand until the victim clicked through. Both routes ended on LiveChat-hosted pages impersonating well-known brands.

How the attack works

In the PayPal-themed version, the victim lands in a LiveChat session that quickly pushes them toward a fake PayPal login page. Cofense says the victim enters login credentials, then submits a multi-factor authentication code sent to their phone. After that, the phishing flow asks for billing details, including payment card information and date of birth, before returning the victim to the LiveChat window with a fake refund confirmation.

Email 1 and Email 2 Body (Source – Cofense)

The Amazon-themed version uses a slightly different flow. Cofense says the page first requests the user’s email address before a supposed live agent appears. From there, the attacker asks for identity details such as a phone number, date of birth, home address, and then full payment card data, including the card number, expiration date, and CVC.

Cofense notes that the attacker language in at least one chat included misspellings and awkward phrasing, which suggests a human operator working from a script rather than a polished automated chatbot. That roughness did not stop the scam from progressing through multiple data collection stages.

Why this tactic is more dangerous than it looks

The biggest advantage for the attackers is trust transfer. Because the links use a legitimate SaaS support environment, the domain and interface may feel safer than a typical phishing page on a random site. That can make victims less cautious, especially when the lure involves a refund or a suspicious order they want to resolve quickly.

Email 2 – LiveChat Harvesting (Source – Cofense)

The tactic also helps phishers collect more than one kind of data in one session. Instead of grabbing only credentials, they can move from identity details to card data to MFA codes in a single guided conversation. That gives them a fuller victim profile and increases the chance of account takeover or payment fraud. This is an inference from Cofense’s documented multi-stage collection flow.

Key details at a glance

ItemDetail
Platform abusedLiveChat
Hosted domain used in lure flowlc.chat
Main lure themesRefund notice, order confirmation
Brands impersonatedPayPal, Amazon
Data targetedCredentials, MFA codes, personal details, payment card data
Collection methodLive chat interaction plus fake login and billing forms

The details in this table come from Cofense’s March 2026 analysis.

CC MFA and Confirmation Message (Source – Cofense)

What users and security teams should watch for

  • Be suspicious of unsolicited refund or order-confirmation emails that push you into chat instead of the brand’s official website or app.
  • Never share MFA codes, full card details, or date of birth inside a support chat opened from an email link. This advice follows directly from the collection steps Cofense observed.
  • Verify transactions by going to the official PayPal, Amazon, or merchant site yourself rather than clicking through an email.
  • Monitor for traffic to suspicious lc.chat URLs and review email security controls for SaaS-hosted phishing links. This recommendation is based on the use of LiveChat-hosted infrastructure in the campaign.

FAQ

What is new about this phishing tactic?

It uses a legitimate live support platform to make the phishing flow feel like a real customer service conversation instead of a standard fake login trap.

Which brands were impersonated?

Cofense documented PayPal-themed and Amazon-themed phishing pages in the campaign.

What information did the attackers try to steal?

The campaign targeted email addresses, phone numbers, dates of birth, home addresses, account credentials, MFA codes, and full payment card details.

Why does the lc.chat domain matter?

Because it belongs to LiveChat infrastructure, which can make phishing links look more legitimate to victims and sometimes less suspicious to basic filters. This is an inference from Cofense’s description of the tactic.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages