Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Posted on November 25, 2025November 25, 2025 By CWS

Cybercriminals have found a brand new assault vector focusing on the artistic design neighborhood by exploiting Blender, a broadly used open-source 3D modeling software.

Risk actors are importing malicious recordsdata to widespread asset platforms like CGTrader, containing embedded Python scripts that execute mechanically when customers open the recordsdata in Blender.

This refined marketing campaign, uncovered via ongoing menace investigations, demonstrates how attackers proceed to adapt their techniques to compromise unsuspecting customers throughout Home windows, macOS, and Linux programs.

The operation has been lively for a minimum of six months and connects to beforehand recognized Russian-linked campaigns that used comparable evasion strategies and decoy documentation strategies.

These malicious .mix recordsdata are weaponized to steal delicate data from sufferer machines, together with passwords, cryptocurrency wallets, and authentication credentials from a number of browsers and purposes.

The menace represents a big threat to the artistic business, the place Blender’s free and highly effective capabilities make it a necessary software for professionals and hobbyists alike.

Morphisec safety researchers recognized and tracked this marketing campaign after analyzing the an infection chain and command and management infrastructure.

The analysis revealed direct connections to StealC V2, a harmful information-stealing malware that has develop into more and more widespread in underground prison markets since its emergence in April 2025.

Understanding the An infection Mechanism

When customers open a compromised .mix file with Blender’s Auto Run Python Scripts setting enabled, the embedded Rig_Ui.py script executes mechanically.

The malware then fetches a PowerShell loader from distant servers managed by the attackers. This loader downloads a number of archive recordsdata containing a totally purposeful Python surroundings preloaded with StealC V2 and extra stealing parts.

Assault Chain (Supply – Morphisec)

The extracted recordsdata create hidden shortcut recordsdata (LNK) which are copied to the Home windows Startup folder, making certain the malware persists throughout system reboots.

The assault chain includes a number of levels of obfuscation and makes use of encrypted communication channels.

Python scripts obtain encrypted payloads utilizing ChaCha20 encryption via the Pyramid command and management infrastructure, making detection and evaluation considerably tougher.

StealC V2 itself targets over 23 net browsers, greater than 100 browser extensions, 15 desktop cryptocurrency wallets, messaging purposes like Telegram and Discord, and VPN purchasers.

The malware contains up to date privilege escalation strategies and maintains low detection charges on safety evaluation platforms, permitting it to evade conventional safety options.

Customers ought to disable Blender’s Auto Run function for untrusted file sources and train warning when downloading 3D fashions from neighborhood platforms.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Blender, Deliver, Files, Foundation, InfoStealer, Leverage, Notorious, StealC, Threat

Post navigation

Previous Post: Major US Banks Impacted by SitusAMC Hack
Next Post: CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp

Related Posts

Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Cyber Security News
Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Cyber Security News
UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News
Windows Remote Desktop Services Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark