A recently uncovered malware dubbed “Airstalk” is being attributed to a suspected nation-state threat actor and is believed to operate through a sophisticated supply-chain style attack. According to the cybersecurity team at Palo Alto Networks’ Unit 42, the malware cluster (tracked as CL-STA-1009) utilizes the AirWatch (now Workspace ONE UEM) mobile device management (MDM) API to establish covert command-and-control channels, enabling exfiltration of browser cookies, bookmarks, history, screenshots and file listings. The malware is available in both PowerShell and .NET variants, with the .NET version demonstrating advanced capabilities including targeting enterprise browsers such as Edge and Island and leveraging a likely stolen certificate for signing. Given the malware’s use of credential and session-cookie theft via business-process-outsourcing (BPO) vendor environments, the threat it poses to both direct victims and their downstream clients is substantial.
Sources: Hacker News, Palo Alto Networks Unit 42
Key Takeaways
– The Airstalk malware targets the AirWatch/Workspace ONE MDM API as an innovative covert command-and-control channel, allowing attackers to hide within legitimate device-management traffic.
– Its two variants (PowerShell and .NET) show distinct levels of sophistication, with the .NET version able to exfiltrate browser artifacts from enterprise-grade browsers, leveraging a stolen certificate for stealth.
– Organizations outsourcing business-process functions (BPOs) face elevated risk: the supply-chain nature of the attack means vendors may serve as gateways to many downstream client systems.
In-Depth
The discovery of the Airstalk malware family marks a potentially significant advance in how threat actors—particularly those backed by nation-states—are evolving their techniques. The research by Unit 42 points to a threat activity cluster, labelled CL-STA-1009, which employs this malware in a supply-chain style intrusion, exploiting weak links in vendor ecosystems rather than solely targeting prime systems directly. The strategy fits a broader trend: adversaries increasingly recognise that compromise of a vendor or service provider can yield access to multiple end-clients, and the “chain” becomes the vector rather than just the endpoint.
At its core, Airstalk is notable for its use of the AirWatch MDM API—now rebranded as Workspace ONE Unified Endpoint Management. By leveraging that API, the malware embeds its command-and-control (C2) traffic inside what appears to be legitimate MDM device-management traffic, thereby evading many detection controls. The PowerShell variant communicates via the devices endpoint (/api/mdm/devices/) using custom device-attributes fields to send and receive messages, essentially forming a dead-drop mechanism: a client device writes to the attribute and the attacker pulls the data, or vice-versa. Meanwhile, the .NET variant advances the game: besides using more complex protocols, it targets additional browsers beyond Chrome (including Microsoft Edge and Island Browser), supports multi-threaded operations (one thread handling C2, another exfiltration of debug logs, a third responsible for periodic beaconing), and in some samples is signed with what appears to be a stolen certificate issued to Aoteng Industrial Automation (Langfang) Co., Ltd, and subsequently revoked. The presence of credible code-signing and usage of legitimate platform APIs indicates a high-value investment from the adversary, consistent with nation-state level operations.
Why this matters to organisations—and particularly to those operating or contracting with BPOs or large-scale service vendors—is the amplification effect. Session cookies, browser history, bookmarks, even full directory listings on compromised hosts can give attackers lateral move paths or access not just to the vendor but to its client networks. As Unit 42 emphasises, the persistence of access in a vendor’s environment is particularly dangerous: once inside, attackers can pivot to multiple clients without repeatedly breaching each one individually. That undermines traditional perimeter-centric defence strategies that assume you must breach each client separately. In this case, compromise of the vendor constitutes compromise of many downstream endpoints.
From a defensive posture perspective, this should drive at least two strategic responses. First, organisations should treat vendor environments with the same scrutiny as their own: thorough auditing, behaviour-based monitoring, and segmentation between vendor and client systems become imperative. Second, reliance on signature-based detection is no longer sufficient; clearly, the adversary is using stealthy channels (MDM traffic, legitimate APIs, signed binaries) that bypass many conventional tools. Behavioural anomaly detection, especially at the level of browser sessions, cookie usage, scheduled tasks (or absence thereof in advanced variants), and outbound traffic disguised as MDM communications, must be layered in.
For any organisation with vendor dependencies—particularly in sectors that hold sensitive data (financial, healthcare, defense, infrastructure)—the arrival of Airstalk should prompt immediate review of vendor risk management, incident-response readiness for supply-chain style events, and tighter oversight of what the vendor’s access really means. In short: the perimeter has shifted; it no longer ends at your firewall—but extends to every partner and provider in your ecosystem.

