{"id":623,"date":"2026-04-16T16:10:19","date_gmt":"2026-04-16T16:10:19","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=623"},"modified":"2026-04-16T16:10:19","modified_gmt":"2026-04-16T16:10:19","slug":"obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=623","title":{"rendered":"Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 16, 2026<\/span><\/span><span class=\"p-tags\">Application Security \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E\/s1700-e365\/el.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A \u00abnovel\u00bb social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency\u00a0sectors.<\/p>\n<p>Dubbed <a href=\"https:\/\/www.elastic.co\/security-labs\/phantom-in-the-vault\"><strong>REF6598<\/strong><\/a> by Elastic Security Labs, the activity has been found to leverage elaborate social engineering tactics through LinkedIn and Telegram to breach both Windows and macOS systems, approaching prospective individuals under the guise of a venture capital firm and then moving the conversation to a Telegram group where several purported partners are\u00a0present.<\/p>\n<p>The Telegram group chat is engineered to lend the operation a smidgen of credibility, with the members discussing topics related to financial services and cryptocurrency liquidity solutions. The\u00a0target is then instructed to use Obsidian to access what appears to be a shared dashboard by connecting to\u00a0a <a href=\"https:\/\/obsidian.md\/help\/vault\">cloud-hosted\u00a0vault<\/a> using the credentials provided to\u00a0them.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-security-guide-d-1\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRxP56rpa2W0O_0yc0xgs5l2r4FRV4Wiuq3IqWuFdsd_4g1c3oRVXoHtW9gxo8ObuxmyjqkAf3cD6N1JbVDos7QX99ZHtmeVrg-FUzSnMZLTl1ZFyiSkpqQiw6BcHXz52jr3s42xWEDFOpwWK6HgXOqscGMNkhA5pZK7h6zVV4dpDaLfgy17TidZXVrtUB\/s728-e100\/nudge-d-1.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>It&#8217;s this vault that triggers the infection sequence. As\u00a0soon as the vault is opened in the note-taking application, the target is asked to enable \u00abInstalled community plugins\u00bb sync, effectively causing malicious code to be\u00a0executed.<\/p>\n<p>\u00abThe threat actors abuse Obsidian&#8217;s legitimate community plugin ecosystem, specifically\u00a0the <a href=\"https:\/\/github.com\/Taitava\/obsidian-shellcommands\">Shell\u00a0Commands<\/a>\u00a0and <a href=\"https:\/\/github.com\/kepano\/obsidian-hider\">Hider<\/a> plugins, to silently execute code when a victim opens a shared cloud vault,\u00bb researchers Salim Bitam, Samir Bousseaden, and Daniel Stepanic said in a technical breakdown of the\u00a0campaign.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>Given that the option is disabled by default and cannot be remotely turned on, the attacker must convince the target to manually toggle the community plugin sync on their device so that the malicious vault configuration can trigger the execution of commands through the Shell Commands plugin. Also\u00a0used in conjunction with Shell Commands is another plugin named Hider to hide certain user interface elements of Obsidian, such as status bar, scrollbar, tooltips, and\u00a0others.<\/p>\n<p>\u00abWhile this attack requires social engineering to cross the community plugin sync boundary, the technique remains notable: it abuses a legitimate application feature as a persistence and command execution channel, the payload lives entirely within JSON configuration files that are unlikely to trigger traditional AV [antivirus] signatures, and execution is handed off by a signed, trusted Electron application, making parent-process-based detection the critical layer,\u00bb the researchers\u00a0said.<\/p>\n<p>Dedicated execution paths are activated depending on the operating system. On\u00a0Windows, the commands are used to invoke a PowerShell script to drop an intermediate loader codenamed PHANTOMPULL that decrypts and launches PHANTOMPULSE in\u00a0memory.<\/p>\n<p>PHANTOMPULSE is an artificial intelligence (AI)-generated backdoor that uses the Ethereum blockchain for resolving its command-and-control (C2) server by fetching\u00a0the <a href=\"https:\/\/etherscan.io\/tx\/0x4ad9923ede3ba2dab91cd37a733c01a08d91caaa4a867b77a3597acb28d40c31\">latest transaction<\/a> associated with\u00a0a <a href=\"https:\/\/etherscan.io\/address\/0xc117688c530b660e15085bF3A2B664117d8672aA\">hard-coded wallet\u00a0address<\/a>. Upon\u00a0obtaining the C2 address, the malware uses WinHTTP for communications, allowing it to send system telemetry data, fetch commands and transmit the execution results, upload files or screenshots, and capture keystrokes.<\/p>\n<p>The supported commands are designed to facilitate comprehensive remote access\u00a0&#8211;<\/p>\n<ul>\n<li><strong>inject<\/strong>, to inject shellcode\/DLL\/EXE into target process<\/li>\n<li><strong>drop<\/strong>, to drop a file to disk and execute it<\/li>\n<li><strong>screenshot<\/strong>, to capture and upload a screenshot\u00a0<\/li>\n<li><strong>keylog<\/strong>, to start\/stop a keylogger<\/li>\n<li><strong>uninstall<\/strong>, to initiate removal of persistence and perform cleanup<\/li>\n<li><strong>elevate<\/strong>, to escalate privileges to SYSTEM via the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/com\/the-com-elevation-moniker\">COM elevation moniker<\/a><\/li>\n<li><strong>downgrade<\/strong>, to transition from SYSTEM to elevated admin<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>On macOS, the Shell Commands plugin delivers an obfuscated AppleScript dropper that iterates over a hard-coded domain list, while employing Telegram as a dead drop resolver for fallback C2 resolution. This\u00a0approach also offers added flexibility as it makes it possible to easily rotate C2 infrastructure, rendering domain-based blocking insufficient.<\/p>\n<p>In the final step, the dropper script contacts the C2 domain to download and execute a second-stage payload via osascript. The\u00a0exact nature of this payload remains unknown given that the C2 servers are currently offline. The\u00a0intrusion was ultimately unsuccessful, as the attack was detected and blocked before the adversary could accomplish their goals on the infected\u00a0machine.<\/p>\n<p>\u00abREF6598 demonstrates how threat actors continue to find creative initial access vectors by abusing trusted applications and employing targeted social engineering,\u00bb Elastic said. \u00abBy abusing Obsidian&#8217;s community plugin ecosystem rather than exploiting a software vulnerability, the attackers bypass traditional security controls entirely, relying on the application&#8217;s intended functionality to execute arbitrary\u00a0code.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 16, 2026Application Security \/ Threat Intelligence A \u00abnovel\u00bb social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":624,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[383,24,143,384,1260,1257,1259,1258,264,113],"class_list":["post-623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-abuse","tag-attacks","tag-crypto","tag-delivers","tag-finance","tag-obsidian","tag-phantompulse","tag-plugin","tag-rat","tag-targeted"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=623"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/623\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/624"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}