Security researchers link a suspected state-backed cluster (Unit 42’s CL-STA-1009) to a new malware family named Airstalk. The malware abuses the AirWatch / Workspace ONE MDM API as a covert C2 channel, comes in PowerShell and .NET variants, and specializes in exfiltrating browser artifacts (cookies, bookmarks, history) and screenshots — making it a powerful tool for long-term access and lateral compromise. The distribution vector looks like a supply-chain / third-party vendor compromise, which means organizations that rely on BPOs or managed services are particularly at risk. Below: what this does, why it matters, and what to do next — from bench to boardroom.
What is Airstalk?
Airstalk is a backdoor that abuses AirWatch / Workspace ONE mobile device management (MDM) APIs to hide command-and-control (C2) traffic inside legitimate-looking MDM API calls. Two variants have been observed:
- PowerShell variant: Uses the
/api/mdm/devices/endpoint and the MDM custom attributes feature as a “dead drop” for commands and small data. Persists via scheduled tasks. - .NET variant: More feature-rich — targets additional enterprise browsers (Edge and Island), mimics an AirWatch helper binary, supports multiple message types (CONNECT/CONNECTED, ACTIONS, RESULT plus DEBUG/PING/MISMATCH), multi-threaded execution for task handling, exfiltration, and beaconing. Some .NET samples appear signed with a likely stolen certificate.
Capabilities include: taking screenshots, collecting browser cookies, enumerating and exfiltrating Chrome/Edge/Island profiles (bookmarks, history, cookies), listing user directories, uploading large outputs via MDM “blob” uploads, and self-uninstall.
Why this matters beyond the technical noise
- Covert use of trusted infrastructure. By piggybacking on MDM APIs, Airstalk blends malicious traffic with legitimate management operations. That reduces detection rates and increases dwell time.
- High-value data extraction. Browser cookies and session artifacts are gold for attackers — they can allow session hijacking, bypassing multi-factor protections, and impersonation of privileged users.
- Supply-chain and third-party risk. Targeting MDM flows and enterprise browsers suggests attackers may have seeded Airstalk via vendor environments or managed services (BPOs), giving them lateral reach across multiple client organizations.
- Persistence + stealth = long-term access. Multi-threaded C2, stolen certificates, and MDM-backed data channels are features you see when attackers aim for sustained espionage, not one-off ransomware.
Who should care (and why)
- Security engineers & SOC analysts: This is a detection challenge — appearance in MDM logs, unusual blobs/uploads, or anomalous use of custom attributes are high-value telemetry.
- IT / Endpoint teams: Browser session hygiene, certificate inventory, and removal or restrictive configuration of legacy MDM features are immediate areas to review.
- Product/security vendors & integrators (BPOs): You are potential force-multipliers for attackers; vendor security posture must be demonstrable and tight.
- CEOs & Boards: This is a reputational and operational risk. Stolen browser artifacts can expose customer and client accounts — meaning downstream legal, contractual, and client-trust implications.
Concrete detection and mitigation steps (technical checklist)
Detect
- Monitor Workspace ONE / AirWatch API usage for anomalous patterns:
- Unusual device IDs making frequent “custom attributes” GET/POSTs
- Unexpected blob uploads (esp. binary blobs from endpoints that rarely upload files)
- New or rare user agents or last-seen IPs interacting with MDM endpoints
- Correlate MDM activity with endpoint process telemetry:
- Suspicious PowerShell parentage, or a process running named
AirwatchHelper.exenot matching known publisher signatures.
- Suspicious PowerShell parentage, or a process running named
- Hunt for signed binaries whose certificate chain is not typically used by your environment (possible stolen certificate).
- Look for signs of cookie theft, e.g., sudden token reuse from diverse geolocations.
Contain
- Throttle or temporarily disable non-essential blob uploads or custom attributes usage in your MDM policy until investigations complete.
- Force logouts / session resets for high-risk web applications where cookie theft would be catastrophic.
- Revoke and rotate any credentials or tokens used by the compromised marketing/MDM/service accounts.
Remediate
- Reimage infected hosts when you find the backdoor; scheduled tasks, startup items, and persistence mechanisms must be removed.
- Rotate certificates and revoke any suspected stolen certs in collaboration with your CA and partners.
- Review third-party vendor access and implement least privilege for MDM API tokens; enforce short token lifetimes and scoped permissions.
Prevent
- Enforce strong certificate and key lifecycle practices for all internal-facing tooling.
- Segment vendor networks and restrict vendor access to production systems using zero-trust network access (ZTNA).
- Regularly audit and rotate service/API tokens used by vendors and marketing/MDM systems.
- Mandate vendor security attestations, scanning, and breach-disclosure SLAs in contracts with BPOs and managed-service providers.
Talking to the board / non-technical leadership (60-second script)
“We’ve seen a sophisticated malware family called Airstalk that uses legitimate device-management APIs to hide its command traffic. Its main danger is quietly exfiltrating browser sessions and credentials via trusted vendor channels — meaning one compromised vendor can yield access across many client systems. I recommend we prioritize an immediate audit of our MDM and third-party API tokens, force session invalidation for critical apps, and brief our vendor partners to confirm they’re not affected.”
Example detection query / hunt (SOC-friendly)
- Search MDM logs for POST/PUT to
/api/mdm/devices/*with outgoing blob uploads > X KB and device IDs not present in baseline. - SIEM rule:
if (workspace_one.api.customAttributesUsage > baseline * 5) and (blobUploadCount > threshold) then alert
(Adapt thresholds to your environment and baseline.)
Final thought — this is a vendor problem and your problem
Airstalk is a textbook example of attackers focusing on trust chains rather than raw exploits of hardened endpoints. If your organization relies on third-party MDM, marketing, or managed services, you must treat those trust relationships as first-class security controls. In other words: vendor security posture + telemetry hygiene = enterprise resilience.
Leave a Reply