Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Posted on November 25, 2025November 25, 2025 By CWS

Cybercriminals have found a brand new assault vector focusing on the artistic design neighborhood by exploiting Blender, a broadly used open-source 3D modeling software.

Risk actors are importing malicious recordsdata to widespread asset platforms like CGTrader, containing embedded Python scripts that execute mechanically when customers open the recordsdata in Blender.

This refined marketing campaign, uncovered via ongoing menace investigations, demonstrates how attackers proceed to adapt their techniques to compromise unsuspecting customers throughout Home windows, macOS, and Linux programs.

The operation has been lively for a minimum of six months and connects to beforehand recognized Russian-linked campaigns that used comparable evasion strategies and decoy documentation strategies.

These malicious .mix recordsdata are weaponized to steal delicate data from sufferer machines, together with passwords, cryptocurrency wallets, and authentication credentials from a number of browsers and purposes.

The menace represents a big threat to the artistic business, the place Blender’s free and highly effective capabilities make it a necessary software for professionals and hobbyists alike.

Morphisec safety researchers recognized and tracked this marketing campaign after analyzing the an infection chain and command and management infrastructure.

The analysis revealed direct connections to StealC V2, a harmful information-stealing malware that has develop into more and more widespread in underground prison markets since its emergence in April 2025.

Understanding the An infection Mechanism

When customers open a compromised .mix file with Blender’s Auto Run Python Scripts setting enabled, the embedded Rig_Ui.py script executes mechanically.

The malware then fetches a PowerShell loader from distant servers managed by the attackers. This loader downloads a number of archive recordsdata containing a totally purposeful Python surroundings preloaded with StealC V2 and extra stealing parts.

Assault Chain (Supply – Morphisec)

The extracted recordsdata create hidden shortcut recordsdata (LNK) which are copied to the Home windows Startup folder, making certain the malware persists throughout system reboots.

The assault chain includes a number of levels of obfuscation and makes use of encrypted communication channels.

Python scripts obtain encrypted payloads utilizing ChaCha20 encryption via the Pyramid command and management infrastructure, making detection and evaluation considerably tougher.

StealC V2 itself targets over 23 net browsers, greater than 100 browser extensions, 15 desktop cryptocurrency wallets, messaging purposes like Telegram and Discord, and VPN purchasers.

The malware contains up to date privilege escalation strategies and maintains low detection charges on safety evaluation platforms, permitting it to evade conventional safety options.

Customers ought to disable Blender’s Auto Run function for untrusted file sources and train warning when downloading 3D fashions from neighborhood platforms.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Blender, Deliver, Files, Foundation, InfoStealer, Leverage, Notorious, StealC, Threat

Post navigation

Previous Post: Major US Banks Impacted by SitusAMC Hack
Next Post: CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp

Related Posts

New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems Cyber Security News
Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line Cyber Security News
Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
Operation FrostBeacon Attacking Finance and Legal Departments with Cobalt Strike Malware Operation FrostBeacon Attacking Finance and Legal Departments with Cobalt Strike Malware Cyber Security News
Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat Cyber Security News
New tool to Remove Copilot, Recall and Other AI tools From Windows 11 New tool to Remove Copilot, Recall and Other AI tools From Windows 11 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark