Elastic Security Labs tracked REF6598, a targeted social-engineering campaign that abused Obsidianâs community plugin sync to execute a cross-platform intrusion chain culminating in a novel Windows RAT named PHANTOMPULSE with blockchain-based C2 resolution. The campaign used LinkedIn/Telegram lures, trojanized Obsidian Shell Commands and Hider plugins for initial access, an in-memory loader called PHANTOMPULL on Windows, and an obfuscated AppleScript dropper with Telegram fallback on macOS. #PHANTOMPULSE #Obsidian
Keypoints
- REF6598 used targeted social engineering on LinkedIn and Telegram to convince victims to log into an attacker-controlled Obsidian cloud vault and enable community plugin sync.
- The initial access vector abused legitimate Obsidian community plugins (Shell Commands and Hider) to trigger silent command execution when a synced vault was opened.
- Windows chain: Shell Commands triggered PowerShell that downloaded a staged loader (syncobs.exe/PHANTOMPULL) which decrypts and reflectively loads PHANTOMPULSE entirely in memory.
- PHANTOMPULSE is a feature-rich, AI-assisted Windows RAT with advanced in-memory injection (module stomping), extensive telemetry, and a decentralized C2 resolution via on-chain Ethereum transaction data.
- macOS chain: obfuscated AppleScript dropper persisted via a LaunchAgent and uses a layered C2 resolution (domains + Telegram dead-drop) with direct osascript execution of staged code.
- Operators rotated C2 by encoding URLs into blockchain transaction calldata, but the design can be hijacked because the malware accepts the most-recent transaction for C2 without verifying sender authenticity.
MITRE Techniques
- [T1566 ] Phishing â Social engineering over LinkedIn and Telegram was used to lure targets into opening the attacker-controlled Obsidian vault and enabling plugin sync (âThe threat actors operate under the guise of a venture capital firm, initiating contact with targets through LinkedInâŚthe conversation moves to a Telegram groupâ).
- [T1059 ] Command and Scripting Interpreter â PowerShell and AppleScript were used to bootstrap and execute staged payloads on Windows and macOS (âsuspicious PowerShell execution with Obsidian as the parent processâ; âthe Shell commands pluginâs macOS command executes a Base64-encoded payload through osascriptâ).
- [T1547 ] Boot or Logon Autostart Execution â macOS persistence was achieved by creating a LaunchAgent plist to run the second-stage dropper at login (âCreates a persistent LaunchAgent plist at ~/Library/LaunchAgents/com.vfrfeufhtjpwgray.plist configured with KeepAlive and RunAtLoad set to trueâ).
- [T1055 ] Process Injection â The Windows loader and RAT perform reflective in-memory loading and advanced injection techniques including module stomping to execute payloads without touching disk (âreflectively loads payloads entirely in memoryâ and âadvanced process injection via module stompingâ).
- [T1071 ] Application Layer Protocol â PHANTOMPULSE communicates with C2 over HTTPS using WinHTTP and defined API endpoints for telemetry, tasking, uploads, and results (âPHANTOMPULSE uses WinHTTP for C2 communication⌠/v1/telemetry/report POSTâ).
- [T1548 ] Abuse Elevation Control Mechanism â The malware includes an escalation capability to SYSTEM via COM elevation moniker as a method for privilege escalation (âEscalate to SYSTEM via COM elevation monikerâ).
- [T1056 ] Input Capture (Keylogging) â Keylogging capability and a C2 endpoint for keylog uploads are included in the RAT (âv1/telemetry/keylog/POSTKeylog data uploadâ; âkeylogStart/stop keyloggerâ).
- [T1113 ] Screen Capture â The RAT can capture and upload screenshots to the C2 (âscreenshotCapture and upload a screenshotâ; âv1/telemetry/upload/POSTScreenshot/file uploadâ).
- [T1041 ] Exfiltration Over C2 Channel â Collected data (screenshots, keylogs, command results) is uploaded back to operator-controlled endpoints over the C2 channel (âv1/telemetry/upload/POSTScreenshot/file uploadâ and â/v1/telemetry/result POST Command result deliveryâ).
- [T1199 ] Trusted Relationship â The adversary abused Obsidianâs legitimate plugin ecosystem and a signed Obsidian client to execute attacker-controlled commands via user-enabled plugin sync (âabuses Obsidianâs legitimate community plugin ecosystem, specifically the Shell Commands and Hider pluginsâ).
Indicators of Compromise
- [SHA-256 ] Staged loader and final payload â 70bbb38b70fd836d66e8166ec27be9aa8535b3876596fc80c45e3de4ce327980 (syncobs.exe / PHANTOMPULL), 33dacf9f854f636216e5062ca252df8e5bed652efd78b86512f5b868b11ee70f (PHANTOMPULSE)
- [IPv4 address ] Payload staging server â 195.3.222[.]251 (PowerShell script and loader delivery)
- [domain-name ] C2 and drop domains â panel.fefea22134[.]net (PhantomPulse C2 panel), 0x666[.]info (macOS dropper C2)
- [URL ] macOS Telegram fallback â t[.]me/ax03bot (Telegram channel used as a fallback dead-drop for C2)
- [crypto-wallet ] Blockchain C2 resolution wallet â 0xc117688c530b660e15085bF3A2B664117d8672aA (wallet used to encode C2 in transaction input); 0x38796B8479fDAE0A72e5E7e326c87a637D0Cbc0E (funding wallet)
- [file name ] Observed file artifacts and script names â syncobs.exe (PHANTOMPULL loader), env:TEMPtt.ps1 (downloaded PowerShell stage), and .obsidian/plugins/obsidian-shellcommands/data.json (malicious Shell Commands configuration)
Read more: https://www.elastic.co/security-labs/phantom-in-the-vault