No connection

Search Results

Crypto Score 32 Bearish

New 'PHANTOMPULSE' Malware Targets Crypto Professionals via Obsidian App

Apr 15, 2026 06:24 UTC
Immediate term

A sophisticated social engineering campaign is leveraging the Obsidian note-taking app to deploy remote access trojans. The attack targets finance and cryptocurrency professionals through LinkedIn and Telegram.

  • Malware deployed via Obsidian community plugins
  • Social engineering lures targets via LinkedIn and Telegram
  • PHANTOMPULSE RAT provides full remote device access
  • Decentralized C2 uses three blockchain networks for redundancy
  • Targets specifically crypto and finance professionals
  • Highlights vulnerability of legitimate productivity software

Elastic Security Labs has uncovered a multi-stage social engineering operation designed to compromise the devices of cryptocurrency and finance industry professionals. The attackers utilize the community plugin ecosystem of the Obsidian note-taking application to execute malicious code silently when a victim opens a shared cloud vault. The campaign typically begins on LinkedIn, where attackers pose as representatives of venture capital firms to establish a plausible business context. Once trust is established, the conversation is moved to Telegram, where targets are lured into using a shared dashboard hosted within Obsidian. This cloud-hosted vault serves as the primary access vector for the attack. Upon enabling community plugin synchronization, the system deploys a previously undocumented remote access trojan (RAT) dubbed 'PHANTOMPULSE.' This malware is designed for high resilience and stealth, granting attackers comprehensive remote control over both Windows and macOS devices. Notably, PHANTOMPULSE employs a decentralized command-and-control (C2) mechanism across three different blockchain networks. By utilizing immutable on-chain transaction data, the malware can locate its controllers without relying on centralized infrastructure, making the operation highly resistant to traditional blocking methods. This threat emerges amid a broader trend of escalating attacks on the digital asset sector. According to data from Chainalysis, approximately $713 million was stolen via individual crypto wallet compromises in 2025 alone. Security experts warn that legitimate productivity tools are increasingly being weaponized to bypass traditional security controls. Organizations are urged to enforce strict app-level plugin policies to defend against the execution of arbitrary code through third-party extensions.

Sign up free to read the full analysis

Create a free account to unlock full AI-curated market articles, personalized alerts, and more.

Share this article

Related Articles

Stay Ahead of the Markets

Join thousands of traders using AI-powered market intelligence. Get personalized insights, real-time alerts, and advanced analysis tools.

Home
Terminal
AI
Markets
Profile