Svmuu News According to a disclosure by Elastic Security Labs, threat actors impersonated a venture capital firm, luring targets via LinkedIn and Telegram to open an Obsidian note vault containing malicious code. This attack leveraged Obsidian's Shell Commands plugin, allowing the execution of a malicious payload when the victim opened the vault without exploiting any vulnerability.
The PHANTOMPULSE discovered in the attack is a previously undocumented Windows Remote Access Trojan (RAT) that utilizes Ethereum transaction data for blockchain-based C2 (Command and Control) communication. The macOS payload employs an obfuscated AppleScript dropper and uses a Telegram channel as a fallback C2. Elastic Defend detected and blocked the attack before PHANTOMPULSE could execute.
Disclaimer:All content on this platform is sourced from the internet and is provided for informational purposes only. None of the content represents the views of this site, nor does it constitute investment advice. Please exercise caution when investing.
Hackers Exploit Obsidian Plugin to Launch PHANTOMPULSE Trojan
Recommended Reading




