Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
New malware scam targets crypto users through Obsidian notes app
A new social engineering scheme is leveraging the Obsidian note-taking app to deploy stealthy malware targeting cryptocurrency and finance professionals.
Summary
Elastic Security Labs released a report Tuesday detailing how attackers use “elaborate social engineering on LinkedIn and Telegram” to bypass traditional security by hiding malicious code within community-developed plugins
The campaign specifically targets individuals in the digital asset space, capitalizing on the permanent nature of blockchain transactions. This vulnerability is particularly acute given that wallet compromises accounted for $713 million in stolen funds during 2025, according to Chainalysis data.
The infiltration begins with scammers posing as venture capital representatives on LinkedIn to initiate professional networking. These conversations eventually transition to Telegram, where the attackers discuss cryptocurrency liquidity solutions to build a “plausible business context.”
Once trust is established, targets are invited to access what is described as a company database or dashboard hosted on a shared Obsidian cloud vault.
Decentralized control via blockchain
Opening the vault serves as the initial access vector. The victim is directed to enable community plugin synchronization, which triggers the silent execution of trojanized software
While the technical execution varies slightly between Windows and macOS, both paths result in the installation of a previously unknown remote access trojan (RAT) named PHANTOMPULSE
This malware is designed to grant attackers full control over the infected device while maintaining a low profile to avoid detection.
PHANTOMPULSE maintains its connection to the attackers through a decentralized command-and-control (C2) system that spans three different blockchain networks
By using on-chain transaction data tied to specific wallets, the malware can receive instructions without a central server
“Because blockchain transactions are immutable and publicly accessible, the malware can always locate its C2 without relying on centralized infrastructure,” Elastic noted.
The use of multiple chains ensures the attack remains resilient even if one blockchain explorer is restricted. This method allows the operators to rotate their infrastructure seamlessly, making it difficult for defenders to sever the link between the malware and its source
Elastic warned that by abusing Obsidian’s intended functionality, the hackers managed to “skirt traditional security controls entirely.”
The firm suggests that organizations operating in high-risk financial sectors should implement strict application-level policies for plugins to prevent legitimate productivity tools from being repurposed as entry points for theft.