Security researchers have identified a new, sophisticated malware named "Airstalk" used in what is assessed with medium confidence to be a nation-state-sponsored supply chain attack. The activity cluster, tracked as CL-STA-1009, demonstrates advanced tradecraft, including the use of a stolen code-signing certificate and a novel command-and-control (C2) channel. The malware abuses the legitimate API of VMware Workspace ONE UEM (formerly AirWatch) to conduct its C2 communications, allowing it to blend in with normal administrative traffic and evade detection. This technique, combined with a supply chain delivery vector, makes Airstalk a significant threat to organizations that rely on compromised software.
The attack represents a classic supply chain compromise, where threat actors target an organization by compromising a third-party software or service it uses. While the specific compromised software has not been named, the payload delivered is the Airstalk malware. The assessment of nation-state involvement is based on the sophistication of the malware, the use of a stolen certificate, and the strategic nature of a supply chain attack.
Airstalk exhibits several advanced features that make it particularly stealthy and resilient:
C2 via Living Off the Land: The malware's most distinctive feature is its abuse of the VMware Workspace ONE API for command and control (T1102 - Web Service). Instead of connecting to a suspicious, actor-controlled domain, it communicates with a legitimate enterprise service. It specifically uses API functions designed for managing custom device attributes and file uploads to send and receive data, making the malicious traffic extremely difficult to distinguish from benign administrative activity.
Stolen Code-Signing Certificate: Some Airstalk samples were found to be digitally signed with a valid, likely stolen, code-signing certificate (T1553.002 - Subvert Trust Controls: Code Signing). This allows the malware to bypass operating system defenses and security products that trust signed binaries, making initial execution more likely to succeed.
Modular and Versioned: The malware is multi-threaded and includes versioning in its C2 protocol, indicating active and ongoing development by a professional team.
Functionality: Airstalk is an espionage tool designed for data gathering and reconnaissance on compromised systems.
As a supply chain attack, the potential impact is widespread. Any organization using the compromised software could become a victim. The primary impact is espionage, as the Airstalk malware is designed to gather and exfiltrate data. The use of a legitimate enterprise management tool's API for C2 makes detection and remediation particularly challenging, as blocking the API could disrupt legitimate business operations. This forces defenders into a difficult position and allows the malware to persist for longer periods.
New details on Airstalk malware: targets BPO sector, steals browser data & screenshots, PowerShell/.NET variants identified.
Further analysis of the Airstalk malware reveals it specifically targets the Business Process Outsourcing (BPO) sector, posing a severe supply chain risk. The malware, found in both PowerShell and .NET variants, is designed to steal sensitive browser data, including cookies, history, and bookmarks, and capture screenshots. This capability allows attackers to potentially bypass multi-factor authentication and gain access to client environments. Additionally, a stolen digital certificate from 'Aoteng Industrial Automation (Langfang) Co., Ltd.' was used to sign some samples, enhancing its evasion capabilities. These new findings indicate a more targeted and impactful espionage campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats