Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT

Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT

Posted on April 16, 2026 By CWS

A novel cyber threat has been unveiled, targeting the finance and cryptocurrency sectors by exploiting the Obsidian note-taking application. This campaign uses sophisticated social engineering tactics to distribute a new Windows remote access trojan (RAT) named PHANTOMPULSE. The attack, identified by Elastic Security Labs as REF6598, leverages platforms like LinkedIn and Telegram to deceive potential victims.

Social Engineering and Initial Access

Threat actors employ elaborate social engineering techniques, approaching targets under the pretext of a venture capital firm. These engagements often transition to a Telegram group where discussions about financial services and cryptocurrency solutions take place. Victims are instructed to access a shared dashboard via Obsidian, connecting to a cloud-hosted vault with provided credentials.

The infection sequence begins when the vault is accessed within Obsidian, prompting victims to enable ‘Installed community plugins’ sync. This action triggers the execution of malicious code. Researchers Salim Bitam, Samir Bousseaden, and Daniel Stepanic highlight the exploitation of Obsidian’s legitimate community plugin ecosystem, specifically the Shell Commands and Hider plugins, to execute code stealthily.

Technical Breakdown and Methodology

The attack requires convincing victims to manually enable plugin sync, as this option is disabled by default. Once activated, the Shell Commands plugin executes malicious commands, while the Hider plugin conceals certain UI elements. This tactic bypasses traditional antivirus detection and utilizes Obsidian’s trusted application status to execute commands.

On Windows systems, PHANTOMPULSE is deployed by executing PowerShell scripts that drop and activate an intermediate loader called PHANTOMPULL. PHANTOMPULSE communicates with its command-and-control (C2) server via the Ethereum blockchain, using WinHTTP for data transmission, command reception, and more. Supported commands include file dropping, screenshot capturing, keylogging, and privilege escalation.

macOS Strategy and Defense Measures

For macOS, the attack utilizes the Shell Commands plugin to execute an obfuscated AppleScript dropper. This script iterates through a fixed domain list, using Telegram as a fallback for C2 resolution. This method allows for flexible C2 infrastructure changes, complicating domain-based blocking efforts. The dropper contacts the C2 domain to download and execute additional payloads via osascript, though the specifics remain unknown due to inactive C2 servers.

The attack was ultimately thwarted before achieving its objectives. Elastic Security Labs emphasizes the creativity of threat actors in finding new access vectors. By exploiting trusted applications rather than software vulnerabilities, attackers evade traditional security measures. This incident underscores the need for vigilance and advanced security protocols to counter such innovative threats.

The Hacker News Tags:Cryptocurrency, Cybersecurity, Elastic Security Labs, financial sector, Hider plugin, macOS, Obsidian, PHANTOMPULSE, remote access trojan, security threat, Shell Commands plugin, social engineering, Threat Actors, Windows

Post navigation

Previous Post: Cisco ISE Flaws Allow Remote Code Execution
Next Post: NIST Updates CVE Enrichment Process for Critical Software

Related Posts

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
How to Browse the Web More Sustainably With a Green Browser How to Browse the Web More Sustainably With a Green Browser The Hacker News
Apple Tests Encrypted RCS Messaging in iOS Beta Apple Tests Encrypted RCS Messaging in iOS Beta The Hacker News
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data The Hacker News
DeepLoad Malware Exploits ClickFix for Credential Theft DeepLoad Malware Exploits ClickFix for Credential Theft The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PowMix Botnet Targets Czech Workforce with Stealth Tactics
  • Critical Cisco Webex Flaw Enables User Impersonation
  • SpankRAT Threatens Windows Security with Stealth Techniques
  • Private Sector Vital in Cybersecurity Battle
  • McGraw-Hill Data Breach Exposes 13.5 Million Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PowMix Botnet Targets Czech Workforce with Stealth Tactics
  • Critical Cisco Webex Flaw Enables User Impersonation
  • SpankRAT Threatens Windows Security with Stealth Techniques
  • Private Sector Vital in Cybersecurity Battle
  • McGraw-Hill Data Breach Exposes 13.5 Million Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark