Description

A targeted cyber campaign has been uncovered in which attackers exploit the legitimate Obsidian note-taking application to distribute a stealthy remote access trojan known as PHANTOMPULSE. The operation primarily targets professionals in the finance and cryptocurrency sectors through carefully crafted social engineering. Threat actors impersonate venture capital entities and initiate contact over LinkedIn, later moving conversations to Telegram to establish trust. Victims are persuaded to access a shared Obsidian vault, presented as a collaborative workspace, which ultimately becomes the entry point for malware delivery. The attack relies on abusing Obsidian’s plugin ecosystem. Once the victim opens the shared vault, they are instructed to enable synchronization of community plugins—effectively bypassing built-in security controls. This action allows malicious configurations embedded within legitimate plugins, such as those capable of executing system-level commands, to run on the host machine. On Windows systems, the infection chain uses PowerShell scripts to download and execute additional payloads, culminating in the deployment of the PHANTOMPULSE RAT. On macOS, similar functionality is achieved using osascript and LaunchAgents to ensure persistence and execute further stages of the attack. From an impact perspective, the campaign demonstrates a sophisticated blend of social engineering and living-off-the-land techniques, making detection challenging. PHANTOMPULSE provides attackers with capabilities such as keylogging, data exfiltration, and remote command execution, posing significant risks to sensitive financial data. The attack highlights the growing threat of abusing trusted applications and plugin ecosystems as delivery vectors. Organizations and individuals must exercise caution when interacting with shared workspaces, restrict plugin usage from untrusted sources, and monitor application behavior for anomalies to mitigate such evolving threats.