Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得快速浏览一下文章内容。看起来这篇文章讲的是一个新型的社会工程攻击活动,利用Obsidian这个笔记软件作为初始入口,传播一种新的远程访问木马PHANTOMPULSE。 攻击者通过LinkedIn和Telegram联系目标,伪装成风险投资公司,然后引导他们加入Telegram群聊。接着让目标使用Obsidian连接到一个云托管的保险库,触发感染过程。这里的关键点是利用Obsidian的社区插件系统来执行恶意代码。 PHANTOMPULSE是一个AI生成的后门程序,使用Ethereum区块链来获取C2服务器地址,并且支持多种远程控制命令。攻击针对金融和加密货币行业。 现在我需要把这些要点浓缩到100字以内。要确保涵盖攻击方式、使用的工具、目标以及技术手段。同时保持语言简洁明了。 可能的结构是:描述攻击活动、利用的工具、如何传播恶意软件、恶意软件的功能以及攻击目标。 最后检查一下字数是否符合要求,并且确保没有遗漏关键信息。 </think> 研究人员发现一起利用笔记软件Obsidian进行社会工程攻击的活动,通过伪装成风险投资公司引导目标连接恶意云保险库,触发远程访问木马PHANTOMPULSE感染。该木马利用Ethereum区块链获取C2地址,并支持多种远程控制功能。 2026-4-16 11:2:0 Author: thehackernews.com(查看原文) 阅读量:11 收藏

Application Security / Threat Intelligence

A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors.

Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage elaborate social engineering tactics through LinkedIn and Telegram to breach both Windows and macOS systems, approaching prospective individuals under the guise of a venture capital firm and then moving the conversation to a Telegram group where several purported partners are present.

The Telegram group chat is engineered to lend the operation a smidgen of credibility, with the members discussing topics related to financial services and cryptocurrency liquidity solutions. The target is then instructed to use Obsidian to access what appears to be a shared dashboard by connecting to a cloud-hosted vault using the credentials provided to them.

It's this vault that triggers the infection sequence. As soon as the vault is opened in the note-taking application, the target is asked to enable "Installed community plugins" sync, effectively causing malicious code to be executed.

"The threat actors abuse Obsidian's legitimate community plugin ecosystem, specifically the Shell Commands and Hider plugins, to silently execute code when a victim opens a shared cloud vault," researchers Salim Bitam, Samir Bousseaden, and Daniel Stepanic said in a technical breakdown of the campaign.

Given that the option is disabled by default and cannot be remotely turned on, the attacker must convince the target to manually toggle the community plugin sync on their device so that the malicious vault configuration can trigger the execution of commands through the Shell Commands plugin. Also used in conjunction with Shell Commands is another plugin named Hider to hide certain user interface elements of Obsidian, such as status bar, scrollbar, tooltips, and others.

"While this attack requires social engineering to cross the community plugin sync boundary, the technique remains notable: it abuses a legitimate application feature as a persistence and command execution channel, the payload lives entirely within JSON configuration files that are unlikely to trigger traditional AV [antivirus] signatures, and execution is handed off by a signed, trusted Electron application, making parent-process-based detection the critical layer," the researchers said.

Dedicated execution paths are activated depending on the operating system. On Windows, the commands are used to invoke a PowerShell script to drop an intermediate loader codenamed PHANTOMPULL that decrypts and launches PHANTOMPULSE in memory.

PHANTOMPULSE is an artificial intelligence (AI)-generated backdoor that uses the Ethereum blockchain for resolving its command-and-control (C2) server by fetching the latest transaction associated with a hard-coded wallet address. Upon obtaining the C2 address, the malware uses WinHTTP for communications, allowing it to send system telemetry data, fetch commands and transmit the execution results, upload files or screenshots, and capture keystrokes.

The supported commands are designed to facilitate comprehensive remote access -

  • inject, to inject shellcode/DLL/EXE into target process
  • drop, to drop a file to disk and execute it
  • screenshot, to capture and upload a screenshot 
  • keylog, to start/stop a keylogger
  • uninstall, to initiate removal of persistence and perform cleanup
  • elevate, to escalate privileges to SYSTEM via the COM elevation moniker
  • downgrade, to transition from SYSTEM to elevated admin

On macOS, the Shell Commands plugin delivers an obfuscated AppleScript dropper that iterates over a hard-coded domain list, while employing Telegram as a dead drop resolver for fallback C2 resolution. This approach also offers added flexibility as it makes it possible to easily rotate C2 infrastructure, rendering domain-based blocking insufficient.

In the final step, the dropper script contacts the C2 domain to download and execute a second-stage payload via osascript. The exact nature of this payload remains unknown given that the C2 servers are currently offline. The intrusion was ultimately unsuccessful, as the attack was detected and blocked before the adversary could accomplish their goals on the infected machine.

"REF6598 demonstrates how threat actors continue to find creative initial access vectors by abusing trusted applications and employing targeted social engineering," Elastic said. "By abusing Obsidian's community plugin ecosystem rather than exploiting a software vulnerability, the attackers bypass traditional security controls entirely, relying on the application's intended functionality to execute arbitrary code."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html
如有侵权请联系:admin#unsafe.sh