New Scam Targets Crypto Users Through Popular Notes App Obsidian
By John Nada·Apr 15, 2026·6 min read
Crypto users are targeted by a new scam exploiting the Obsidian app to run malware, raising significant security concerns in the crypto ecosystem.
Crypto users are facing a sophisticated social engineering scam that exploits the Obsidian notes application to deploy malware. Elastic Security Labs has reported that attackers leverage community plugins on Obsidian to execute malicious code, gaining control over victims' devices without their consent.
The scammers initiate contact through LinkedIn, posing as representatives of a venture capital firm, and eventually shift the conversation to Telegram. They create a false narrative around financial services, specifically targeting cryptocurrency liquidity solutions, to lend credibility to their scheme. Victims are then encouraged to access a shared cloud vault via Obsidian, which serves as the entry point for the attack.
Upon opening the malicious vault, users are prompted to enable community plugins sync, allowing the malware, identified as PHANTOMPULSE, to activate. This remote access trojan, designed for stealth and resilience, can operate on both Windows and macOS systems. PHANTOMPULSE utilizes a decentralized command-and-control mechanism across multiple blockchain networks, making it difficult to track and disrupt.
Elastic noted that this incident underscores the evolving tactics used by cybercriminals targeting the crypto sector. The use of social engineering, particularly through platforms like LinkedIn and Telegram, exemplifies how scammers are adapting to exploit users' trust in familiar environments. In 2025 alone, over $713 million was stolen from individual crypto wallets, highlighting the vulnerability of crypto users. The company's report emphasizes the need for financial and crypto organizations to implement stringent app-level plugin policies to safeguard against such threats.
The implications of this scam extend beyond individual losses. As blockchain transactions are irreversible, the financial impact on victims can be significant, feeding into wider concerns about security within the crypto ecosystem. Each successful attack not only results in the loss of funds for the victim but also undermines the overall trust in cryptocurrency systems, which is critical for their adoption and growth.
This incident serves as a stark reminder that even trusted productivity tools can be manipulated for malicious purposes, emphasizing the necessity for vigilance among crypto users and service providers alike. The fact that Obsidian, a widely used notes application, can be exploited in such a manner raises questions about the security protocols in place for community plugins and third-party integrations.
As the cryptocurrency landscape matures, so do the methods employed by attackers. The growing sophistication of scams like this one highlights the urgent need for enhanced security measures. Organizations within the crypto space must prioritize security measures and user education to mitigate the risk posed by similar scams in the future. Users should be aware of the potential dangers of enabling community plugins, especially when prompted by unsolicited communications from unknown sources.
Elastic Security Labs detailed that the scammers first establish a connection with their targets through LinkedIn, where they masquerade as venture capitalists. This initial contact is crucial as it helps build a facade of legitimacy, allowing the scammers to gain the victims' trust. Once the conversation is established, they deftly transition to Telegram, a platform known for its encryption and privacy features, further enhancing their credibility in the eyes of the victims.
In these discussions, attackers often weave a narrative around financial services, specifically targeting cryptocurrency liquidity solutions. This tailored approach not only makes the scam more believable but also aligns with the interests of cryptocurrency enthusiasts. By presenting themselves as knowledgeable insiders, the scammers can effectively manipulate their targets into complying with their requests.
The attackers ask their target to use Obsidian, framing it as their fake company’s database for accessing a shared dashboard. The potential victim is then given a login to connect to a cloud-hosted vault controlled by the attackers. "This vault is the initial access vector," Elastic stated in its report. Once opened in Obsidian, the target is instructed to enable community plugins sync, unwittingly setting the stage for the malware to execute its malicious payload.
The attacks differ slightly on Windows and macOS, but both deploy a previously undocumented remote access trojan, or RAT, which Elastic dubbed “PHANTOMPULSE.” This malware, which is disguised as legitimate software, grants the attackers comprehensive control over the victim's device. Elastic characterized PHANTOMPULSE as being "designed for stealth, resilience, and comprehensive remote access," which speaks to the sophistication of its design and functionality.
One of the most concerning aspects of PHANTOMPULSE is its decentralized command-and-control mechanism. By utilizing at least three different blockchain networks, the malware can evade detection and interruption more effectively than traditional trojans that rely on centralized servers. This technique provides the operator with an infrastructure-agnostic rotation capability, which means that even if one blockchain's explorer is blocked or unavailable, the malware can still communicate with its command and control mechanisms through the other chains.
Elastic Security Labs emphasized the creative tactics employed by these cybercriminals. Their ability to abuse Obsidian's community-run plugin ecosystem allowed them to skirt traditional security controls entirely, relying on the application's intended functionality to execute arbitrary code. This revelation serves as a critical warning to financial and crypto companies: legitimate productivity tools can be repurposed into attack vectors. Organizations need to implement stringent app-level plugin policies to defend against similar attacks.
The nature of the scam also highlights the importance of user education. Many victims may not realize the risks associated with enabling community plugins or interacting with unsolicited communications. Educational initiatives aimed at informing users about the potential dangers they face in the crypto space are essential. Such programs can empower users to recognize suspicious behavior and make informed decisions about their online security.
As the cryptocurrency industry continues to expand, the frequency and sophistication of these scams are likely to increase. Cybercriminals are always on the lookout for new vulnerabilities to exploit, and as more users adopt cryptocurrency for their transactions, the stakes become even higher. Therefore, it is imperative that both users and organizations remain vigilant and proactive in their approach to cybersecurity.
By thoroughly understanding the tactics employed by attackers and the vulnerabilities inherent in popular applications like Obsidian, users can better protect themselves against such scams. The crypto industry must foster a culture of security awareness, where users are encouraged to question the legitimacy of requests and be cautious about the tools they use.
The stakes are high in the world of cryptocurrency, and the consequences of falling victim to scams can be devastating. As such, ongoing efforts to improve cybersecurity measures, coupled with user education, will be critical in safeguarding the integrity of the crypto ecosystem moving forward. The lessons learned from incidents like the one involving Obsidian can help shape a more secure future for all participants in the space, ensuring that innovation does not come at the expense of user safety.
