A suspected nation state attacker is deploying a new Windows malware variant called Airstalk, possibly as part of a supply chain attack.
[Airstalk] uses the API to establish a covert command-and-control (C2) channel, primarily through the AirWatch feature to manage custom device attributes and file uploads.
According to Palo Alto Networks' researchers, Airstalk leverages the AirWatch API for mobile device management and is able to harvest cookies, browsing history, bookmarks, and screenshots from web browsers.
Author's summary: New malware variant Airstalk targets browsers and devices.