Connect with us
DAPA Banner

Crypto World

New malware scam targets crypto users through Obsidian notes app

Published

on

Crypto-paid ‘revenge for hire’ ring busted in South Korea

A new social engineering scheme is leveraging the Obsidian note-taking app to deploy stealthy malware targeting cryptocurrency and finance professionals.

Summary

  • Scammers are using LinkedIn and Telegram to trick crypto professionals into downloading malicious Obsidian plugins that deploy a remote access trojan.
  • Elastic Security Labs discovered that the undocumented PHANTOMPULSE malware uses three different blockchain networks to receive commands and maintain persistence.
  • Security researchers recommend that financial firms implement strict application-level plugin policies to prevent legitimate productivity tools from being exploited.

Elastic Security Labs released a report Tuesday detailing how attackers use “elaborate social engineering on LinkedIn and Telegram” to bypass traditional security by hiding malicious code within community-developed plugins. 

The campaign specifically targets individuals in the digital asset space, capitalizing on the permanent nature of blockchain transactions. This vulnerability is particularly acute given that wallet compromises accounted for $713 million in stolen funds during 2025, according to Chainalysis data.

Advertisement

The infiltration begins with scammers posing as venture capital representatives on LinkedIn to initiate professional networking. These conversations eventually transition to Telegram, where the attackers discuss cryptocurrency liquidity solutions to build a “plausible business context.” 

Once trust is established, targets are invited to access what is described as a company database or dashboard hosted on a shared Obsidian cloud vault.

Opening the vault serves as the initial access vector. The victim is directed to enable community plugin synchronization, which triggers the silent execution of trojanized software. 

Advertisement

While the technical execution varies slightly between Windows and macOS, both paths result in the installation of a previously unknown remote access trojan (RAT) named PHANTOMPULSE. 

This malware is designed to grant attackers full control over the infected device while maintaining a low profile to avoid detection.

PHANTOMPULSE maintains its connection to the attackers through a decentralized command-and-control (C2) system that spans three different blockchain networks. 

By using on-chain transaction data tied to specific wallets, the malware can receive instructions without a central server. 

Advertisement

“Because blockchain transactions are immutable and publicly accessible, the malware can always locate its C2 without relying on centralized infrastructure,” Elastic noted.

The use of multiple chains ensures the attack remains resilient even if one blockchain explorer is restricted. This method allows the operators to rotate their infrastructure seamlessly, making it difficult for defenders to sever the link between the malware and its source. 

Elastic warned that by abusing Obsidian’s intended functionality, the hackers managed to “skirt traditional security controls entirely.” 

The firm suggests that organizations operating in high-risk financial sectors should implement strict application-level policies for plugins to prevent legitimate productivity tools from being repurposed as entry points for theft.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

how it happened, and what it means for DeFi

Published

on

how it happened, and what it means for DeFi

A roughly $292 million exploit over the weekend has rattled the crypto industry, exposing vulnerabilities in decentralized finance (DeFi) infrastructure and raising concerns about knock-on effects across lending protocols.

While investigations are still ongoing, early analysis suggests the attack centered on Kelp’s rsETH token — a yield-bearing version of ether (ETH) — and the mechanism used to move assets between blockchains.

The attacker appears to have manipulated that system to create large amounts of tokens without proper backing, then quickly used them as collateral to borrow and drain real assets from lending markets, mostly from Aave , the largest decentralized crypto lender.

The incident is the latest blow to DeFi, happening only a couple weeks after the $285 million exploit of Solana-based protocol Drift, further denting investor trust in the nearly $90 billion crypto sector.

Advertisement

How the attack worked

At a high level, the exploit targeted a LayerZero bridge component — a piece of infrastructure that enables assets to move across different blockchains, Charles Guillemet, CTO of hardware wallet maker Ledger, told CoinDesk in a note.

Bridges typically work by locking assets on one chain and minting equivalent tokens on another. That process depends on a trusted entity — often called an oracle or validator — to confirm deposits.

In this case, Kelp effectively acted as that verifier. According to Guillemet, the system relied on a single-signer setup, meaning just one entity could approve any transactions.

“It seems the attacker was able to sign a message … allowing him to mint large amount of rsETH,” he said. He added that it remains unclear how that access was obtained.

Advertisement

Michael Egorov, founder of Curve Finance, pointed to the same weakness in the system’s configuration.

“Things can happen when you trust one single party — whoever that would be.”

That setup allowed the attacker to effectively create unbacked tokens, even though no corresponding assets were locked on the source chain.

Once minted, the tokens were quickly deployed. The attacker “immediately deposited them in lending protocols mostly Aave to borrow real ETH against,” Guillemet explained.

Advertisement

That maneuver shifted the problem from a single exploit into a broader market issue. DeFi lending platforms are now left holding collateral that may be difficult to unwind, while valuable and liquid assets are already drained.

“Aave was left with rsETH which cannot be really sold and maxborrowed [sic] ETH, so no one can withdraw ETH,” Curve’s Egorov said.

As a result, Aave and other lending protocols may be sitting on hundreds of millions of dollars in questionable collateral and bad debt, he warned, raising concerns of a potential “bank run” dynamic as users rush to withdraw funds.

Aave saw about a $6 billion drop in assets on the protocol as users yanked their assets following the incident. The token associated with the protocol was down about 15% over the past 24 hours’ trading.

Advertisement

What we still don’t know

Key questions remain around how the validator was compromised. The system relied on LayerZero’s official node, raising uncertainty over whether it was hacked, misconfigured or misled.

“Was it hacked? Was it fooled? We don’t know,” Egorov said.

The attacker’s identity is also unknown, though Guillemet said the scale of the attack suggests a sophisticated actor.

“Clearly not some script kiddies,” he said.

Advertisement

Big blow for trust in DeFi

Beyond the immediate losses, the exploit the episode serves as another reminder that as DeFi grows more interconnected, failures in one layer can quickly cascade across the system.

Egorov argued that non-isolated lending models, where assets share risk across pools, amplify the impact of such events.

He also pointed to shortcomings in how new assets are onboarded to lending platforms, saying configurations like Kelp’s 1-of-1 verifier setup should have been flagged earlier.

However, Egorov said there’s a silver lining. “Crypto is a harsh environment which no bank would have survived — yet we are working with that,” he said. “I think DeFi will learn from this incident and become stronger than before.”

Advertisement

Still, even as incidents like this lead to protocol upgrades and redesigns, they also chip away investor confidence in the broader DeFi sector.

“All in all, the trust into DeFi protocols is eroded by this kind of event,” Guillemet said.

“And 2026 will most likely be the worst year in terms of hacks, again,” he added.

Read more: ‘DeFi is dead’: crypto community scrambles after this year’s biggest hack exposes contagion risks

Advertisement

Source link

Continue Reading

Crypto World

Stablecoins Do Not Threaten Banking Just Yet: Analyst

Published

on

Stablecoins Do Not Threaten Banking Just Yet: Analyst

The impact of stablecoins on the banking sector appears “limited” at the current phase of the adoption cycle, but banks could face increasing competition and an erosion of market share as the stablecoin sector and tokenized real-world assets (RWAs) grow in market capitalization. 

“So far, the use of stablecoins remains limited, but their market capitalization exceeded $300 billion at the end of last year,” Abhi Srivastava, associate vice president of Moody’s Investors Service Digital Economy Group, told Cointelegraph.

The stablecoin market cap has surged past $300 billion. Source: RWA.xyz

The role of stablecoins in payments, cross-border commerce and onchain finance is “expanding,” despite their currently limited role, Srivastava said, adding that existing payment systems in the US are already “fast, low-cost and trusted.” He said:

“For the banking sector, at this stage, disruption risk appears limited. In the near term, US rules that prohibit stablecoins from paying yield mean they are unlikely to replace traditional deposits at scale domestically.”

However, over time, growing adoption of stablecoins and tokenized RWAs, traditional or physical financial assets represented on a blockchain by a token, could place “pressure” on the banking sector, leading to deposit outflows and reduced lending capacity, he said.

Stablecoin regulatory policy has become a hot-button issue among crypto industry executives and those in the banking sector, with fears that yield-bearing stablecoins could erode banking market share proving to be a stumbling block for the CLARITY crypto market structure bill in Congress. 

Advertisement

Related: Stablecoins behave like FX markets as liquidity splits: Eco CEO

CLARITY Act stalled, as banks fight yield-bearing stablecoins

The Digital Asset Market Clarity Act of 2025, also known as the CLARITY Act, is a comprehensive crypto market regulatory framework that establishes an asset taxonomy, regulatory jurisdiction and oversight over the crypto markets.

The CLARITY crypto market structure bill. Source: US Congress

It is now stalled in Congress after a group of crypto industry companies, led by cryptocurrency exchange Coinbase, publicly stated opposition to earlier drafts of the bill.

A lack of legal protections for open-source software developers and a prohibition on yield-bearing stablecoins were among some of the most contentious issues cited by crypto industry opponents of the legislation.

Several attempts have been made by US lawmakers and the White House to negotiate a bill acceptable to both the crypto industry and the bank lobby.

Advertisement

Earlier this month, North Carolina Senator Thom Tillis said he plans to release an updated draft bill proposal that would be acceptable to both sides; however, the bill has reportedly received pushback, according to Politico, and has yet to be publicly released. 

However, other crypto industry executives and market analysts have warned that if the CLARITY Act fails to pass, it could open the crypto industry up to future regulatory crackdowns by hostile lawmakers and officials.

Magazine: Stablecoins will see explosive growth in 2025 as world embraces asset class