Nation-State Airstalk Malware Uses Multi-Threaded C2 to Steal Windows Logins

TL;DR Summary
A suspected nation-state threat actor has deployed a new malware called Airstalk, exploiting the AirWatch API for covert C2 communication, with variants capable of capturing browser data and executing various malicious tasks, potentially targeting enterprise sectors like BPO in a sophisticated supply chain attack.
Topics:technology#airstalk#cybersecurity#enterprise-browsers#malware#nation-state#supply-chain-attack
- Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack The Hacker News
- Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack Unit 42
- New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins CyberSecurityNews
- Airstalk Malware Targets Windows Systems Using Multithreaded C2 Communication to Steal Credentials Cyber Press
- Airstalk Malware: Multi-Threaded C2 Steals Windows Logins GBHackers News
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
4 min
vs 4 min read
Condensed
94%
788 → 44 words
Want the full story? Read the original article
Read on The Hacker News