Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Posted on November 25, 2025November 25, 2025 By CWS

Nov 25, 2025Ravie LakshmananMalware / Browser Safety
Cybersecurity researchers have disclosed particulars of a brand new marketing campaign that has leveraged Blender Basis information to ship an info stealer often called StealC V2.
“This ongoing operation, energetic for not less than six months, entails implanting malicious .mix information on platforms like CGTrader,” Morphisec researcher Shmuel Uzan mentioned in a report shared with The Hacker Information.
“Customers unknowingly obtain these 3D mannequin information, that are designed to execute embedded Python scripts upon opening in Blender — a free, open-source 3D creation suite.”

The cybersecurity firm mentioned the exercise shares similarities with a previous marketing campaign linked to Russian-speaking menace actors that concerned impersonating the Digital Frontier Basis (EFF) to focus on the net gaming group and infect them with StealC and Pyramid C2.
This evaluation is predicated on tactical similarities in each campaigns, together with utilizing decoy paperwork, evasive strategies, and background execution of malware.
The most recent set of assaults abuses the power to embed Python scripts in .mix information like character rigs which might be robotically executed when they’re opened in situations the place the Auto Run choice is enabled. This habits might be harmful because it opens the door to the execution of arbitrary Python scripts.

The safety threat has been acknowledged by Blender in its personal documentation, which states: “The power to incorporate Python scripts inside blend-files is efficacious for superior duties comparable to rigging and automation. Nonetheless, it poses a safety threat since Python doesn’t prohibit what a script can do.”
The assault chains primarily contain importing malicious .mix information to free 3D asset websites comparable to CGTrader containing a malicious “Rig_Ui.py” script, which is executed as quickly as they’re opened with Blender’s Auto Run function enabled. This, in flip, fetches a PowerShell script to obtain two ZIP archives.

Whereas one of many ZIP information incorporates a payload for StealC V2, the second archive deploys a secondary Python-based stealer on the compromised host. The up to date model of StealC, first introduced in late April 2025, helps a variety of knowledge gathering options, permitting knowledge to be extracted from 23 browsers, 100 net plugins and extensions, 15 cryptocurrency pockets apps, messaging companies, VPNs, and e mail purchasers.
“Preserve Auto Run disabled except the file supply is trusted,” Morphisec mentioned. “Attackers exploit Blender that usually runs on bodily machines with GPUs, bypassing sandboxes and digital environments.”

The Hacker News Tags:Assets, Blender, DataStealing, Deploy, Hackers, Hijack, Malware, StealC

Post navigation

Previous Post: 640 NPM Packages Infected in New ‘Shai-Hulud’ Supply Chain Attack
Next Post: 3 SOC Challenges You Need to Solve Before 2026

Related Posts

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide The Hacker News
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto The Hacker News
New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains The Hacker News
Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams The Hacker News
Ransomware Defense Using the Wazuh Open Source Platform The Hacker News
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark