Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla shareholders approve Elon Musk’s $1 trillion compensation package

Sam Altman doesn’t want government to bail out OpenAI if it fails

SpaceX’s Starlink passes 8 million customers, secures more spectrum and airlines

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Nation-state hackers deploy new Airstalk malware in suspected supply chain attack
Identity

Nation-state hackers deploy new Airstalk malware in suspected supply chain attack

userBy userOctober 31, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 31, 2025Ravi LakshmananMalware/Browser Security

A suspected nation-state threat actor is believed to be involved in distributing a new malware called Airstalk as part of a supply chain attack.

Palo Alto Networks Unit 42 said it is tracking the cluster, designated CL-STA-1009. “CL” stands for cluster, and “STA” stands for state-backed motives.

“Airstalk exploits the AirWatch API for mobile device management (MDM), now called Workspace ONE Unified Endpoint Management,” security researchers Kristopher Russo and Chema Garcia wrote in their analysis. “Using APIs to establish covert command and control (C2) channels primarily through AirWatch functionality and manage custom device attributes and file uploads.”

The malware, which appears as PowerShell and .NET variants, leverages the multi-threaded command-and-control (C2) communication protocol and can capture screenshots and collect cookies, browser history, bookmarks, and screenshots from web browsers. It is believed that the attackers are using stolen certificates to sign some artifacts.

Unit 42 said the .NET variant of Airstalk has more features than the PowerShell version, suggesting it may be an advanced version of the malware.

The PowerShell variant utilizes the “/api/mdm/devices/” endpoint for C2 communication. While the endpoint is designed to retrieve content details for a specific device, the malware uses the API’s custom attributes functionality to act as a dead drop resolver to store information needed to interact with the attacker.

DFIR retainer service

Once launched, the backdoor initializes the connection by sending a “CONNECT” message and waits for a “CONNECTED” message from the server. It then receives various tasks to be performed on the compromised host in the form of “ACTIONS” type messages. The output of the execution is sent back to the attacker using a “RESULT” message.

The backdoor supports seven different actions, including taking screenshots, retrieving cookies from Google Chrome, listing all user Chrome profiles, retrieving browser bookmarks for a particular profile, collecting browser history for a particular Chrome profile, enumerating all files in the user’s directory, and uninstalling from the host.

“Some tasks require large amounts of data or files to be sent back after Airstalk runs,” Unit 42 said. “To do this, the malware uses the AirWatch MDM API’s BLOB functionality to upload the content as a new BLOB.”

The .NET variant of Airstalk mimics the AirWatch Helper utility (‘AirwatchHelper.exe’) while extending its functionality by also targeting the enterprise browsers Microsoft Edge and Island. In addition, it supports three additional message types.

MISMATCH, to flag a version mismatch error DEBUG, to send a debug message PING, to send a beacon

Additionally, three different execution threads are used, each serving a specific purpose of managing C2 tasks, extracting debug logs, and beaconing to the C2 server. The malware also supports a broader set of commands, one of which does not appear to have been implemented yet.

Screenshot, UpdateChrome to take a screenshot, FileMap to extract a specific Chrome profile, RunUtility (not implemented) to list the contents of a specific directory EnterpriseChromeProfiles, UploadFile to get available Chrome profiles, OpenURL to extract specific Chrome artifacts and credentials, Open new URL in Chrome Uninstall, Exit Execution EnterpriseChromeBookmarks, Get Chrome bookmarks from a specific user profile EnterpriseIslandProfiles, Profile to get available Island browsers UpdateIsland, ExfilAlreadyOpenChrome to extract a specific Island browser profile, Dump all cookies from the current Chrome profile

CIS build kit

Interestingly, while the PowerShell variant uses scheduled tasks for persistence, its .NET version has no such mechanism. Unit 42 said some of the .NET variant samples were signed with “possibly stolen” certificates signed by a valid certificate authority (Aoteng Industrial Automation (Langfang) Co., Ltd.), and early iterations featured a compilation timestamp of June 28, 2024.

At this time, it is unclear how the malware was distributed or who was targeted in these attacks. However, the use of MDM-related APIs in C2 and the targeting of enterprise browsers like Island suggests the possibility of supply chain attacks targeting the business process outsourcing (BPO) sector.

“Organizations specializing in BPO have become lucrative targets for both criminals and nation-state actors,” the report said. “Threatening attackers are willing to invest the resources necessary to not only compromise security, but maintain access indefinitely.”

“The evasion techniques employed by this malware allow it to remain undetected in most environments. This is especially true when the malware is running within a third-party vendor’s environment. This is especially disastrous for organizations using BPO, as stolen browser session cookies can potentially provide access to a large number of clients.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOne molecule could usher revolutionary medicines for cancer, diabetes and genetic disease — but the US is turning its back on it
Next Article Government hackers infiltrated telecommunications giant Ribbon for months before being arrested
user
  • Website

Related Posts

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

November 6, 2025

Cisco warns of new firewall attacks exploiting CVE-2025-20333 and CVE-2025-20362

November 6, 2025

Building cyber resilience in financial services

November 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla shareholders approve Elon Musk’s $1 trillion compensation package

Sam Altman doesn’t want government to bail out OpenAI if it fails

SpaceX’s Starlink passes 8 million customers, secures more spectrum and airlines

Meta brings AI-developed short video feed to Europe

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.