Airstalk Malware: Sophisticated Windows Threat Targets Supply Chains
Cyber Security News by CyberSum.net
Palo Alto Networks’ Unit 42 has discovered Airstalk, a sophisticated Windows malware family that uses VMware AirWatch APIs for covert command-and-control. Available in PowerShell and .NET variants, Airstalk is believed to be used by a nation-state threat actor in supply chain attacks. The malware steals browser data, credentials, and screenshots while evading detection through legitimate cloud service abuse. It targets organizations through trusted third-party vendors, with a focus on business process outsourcing (BPO) providers. The malware's advanced evasion techniques include using stolen certificates and manipulating PE timestamps.