TL;DR
Cybersecurity researchers identified a targeted campaign leveraging Obsidian to deploy a new RAT called PHANTOMPULSE. Attackers use social engineering via LinkedIn and Telegram to trick victims into enabling malicious plugins, leading to full system compromise. The malware’s C2 infrastructure uses Ethereum blockchain transactions, complicating detection and takedown efforts.
Security researchers have confirmed that a social engineering campaign is exploiting the Obsidian note-taking app to deploy a previously undocumented remote access trojan named PHANTOMPULSE, targeting individuals in finance and cryptocurrency sectors on Windows and macOS.
The campaign, identified as REF6598, involves threat actors posing as venture capitalists on LinkedIn and Telegram, engaging targets before inviting them to collaborate via a shared cloud-hosted Obsidian vault. The attack hinges on convincing victims to enable ‘Installed community plugins,’ which then executes malicious scripts.
On Windows, the malicious script drops a loader called PHANTOMPULL, which decrypts and launches the PHANTOMPULSE RAT directly into memory, avoiding traditional detection methods. On macOS, a similar process occurs using AppleScript. The RAT can perform keystroke logging, take screenshots, exfiltrate files, and execute commands.
PHANTOMPULSE employs a novel command-and-control (C2) mechanism by querying the Ethereum blockchain for transaction data from a hard-coded wallet. The latest transaction contains the C2 server’s IP address, providing a decentralized and resilient control infrastructure that is difficult to disrupt.
Why It Matters
This development demonstrates a high level of sophistication in cyber espionage, combining social engineering with advanced malware techniques. The use of blockchain for C2 makes the threat highly resilient, complicating efforts to detect and block the malware. Victims in finance and crypto could face theft of sensitive data, including wallet keys and trading strategies, with potential financial losses.

Mastering Microsoft Endpoint Manager: Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
Mastering Microsoft Endpoint Manager: Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Background
The campaign builds on prior trends of targeting high-value sectors with social engineering and malware. Obsidian, a popular note-taking app, was previously considered secure; this campaign exposes its potential as an attack vector when misused through malicious plugins. The attack’s multi-stage nature and use of decentralized C2 infrastructure mark a significant evolution in threat tactics.
“This campaign illustrates how legitimate tools like Obsidian can be weaponized through social engineering and malicious plugins, making detection particularly challenging.”
— Cybersecurity researcher
“The use of blockchain for command-and-control significantly increases the resilience of malware infrastructure against takedowns.”
— Official cybersecurity advisory

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
What Remains Unclear
It is not yet clear how widespread the campaign is or how many victims have been compromised. The full technical details of the malicious plugins and the extent of the malware’s capabilities are still under investigation. Additionally, attribution to specific threat actors remains unconfirmed.

CZUR ET MAX Professional Book Scanner, 38MP Document Camera, Laser Curve-Flatten, USB High Speed Document Scanner, 180+ Languages OCR, Capture A3, Support HDMI, for Windows/MacOS/Linux
High-Resolution Scanning: Features a 38MP CMOS sensor with a resolution of 7168 × 5376 and 410 DPI, suitable…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
What’s Next
Researchers and security teams are expected to develop detection signatures focusing on Obsidian process behavior, plugin activity, and blockchain traffic. Efforts will likely include user education on social engineering risks and enhanced monitoring of plugin installations. Further analysis may reveal the full scope of the campaign and additional malware variants.

Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Key Questions
How can I protect myself from this type of attack?
Be cautious when enabling community plugins in Obsidian, especially from untrusted sources. Avoid opening shared vaults from unknown contacts and disable auto-sync for untrusted sources. Use endpoint security solutions to detect suspicious scripts and process activity, and stay informed about the latest threats targeting your industry.
What makes PHANTOMPULSE different from other malware?
PHANTOMPULSE employs a decentralized command-and-control infrastructure using the Ethereum blockchain, making it highly resilient to takedown efforts. It also uses memory-based payload execution to evade detection and can perform a wide range of malicious activities once deployed.
Is this attack limited to Windows or macOS?
The campaign targets both Windows and macOS systems, with the attack chain adapted to each platform’s environment, increasing its potential impact across different user bases.
Has any organization been publicly confirmed as compromised?
There are no publicly confirmed reports of specific organizations being compromised; investigations are ongoing, and the campaign appears highly targeted toward individuals in specific sectors.