Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Posted on November 25, 2025November 25, 2025 By CWS

Cybercriminals have found a brand new assault vector focusing on the artistic design neighborhood by exploiting Blender, a broadly used open-source 3D modeling software.

Risk actors are importing malicious recordsdata to widespread asset platforms like CGTrader, containing embedded Python scripts that execute mechanically when customers open the recordsdata in Blender.

This refined marketing campaign, uncovered via ongoing menace investigations, demonstrates how attackers proceed to adapt their techniques to compromise unsuspecting customers throughout Home windows, macOS, and Linux programs.

The operation has been lively for a minimum of six months and connects to beforehand recognized Russian-linked campaigns that used comparable evasion strategies and decoy documentation strategies.

These malicious .mix recordsdata are weaponized to steal delicate data from sufferer machines, together with passwords, cryptocurrency wallets, and authentication credentials from a number of browsers and purposes.

The menace represents a big threat to the artistic business, the place Blender’s free and highly effective capabilities make it a necessary software for professionals and hobbyists alike.

Morphisec safety researchers recognized and tracked this marketing campaign after analyzing the an infection chain and command and management infrastructure.

The analysis revealed direct connections to StealC V2, a harmful information-stealing malware that has develop into more and more widespread in underground prison markets since its emergence in April 2025.

Understanding the An infection Mechanism

When customers open a compromised .mix file with Blender’s Auto Run Python Scripts setting enabled, the embedded Rig_Ui.py script executes mechanically.

The malware then fetches a PowerShell loader from distant servers managed by the attackers. This loader downloads a number of archive recordsdata containing a totally purposeful Python surroundings preloaded with StealC V2 and extra stealing parts.

Assault Chain (Supply – Morphisec)

The extracted recordsdata create hidden shortcut recordsdata (LNK) which are copied to the Home windows Startup folder, making certain the malware persists throughout system reboots.

The assault chain includes a number of levels of obfuscation and makes use of encrypted communication channels.

Python scripts obtain encrypted payloads utilizing ChaCha20 encryption via the Pyramid command and management infrastructure, making detection and evaluation considerably tougher.

StealC V2 itself targets over 23 net browsers, greater than 100 browser extensions, 15 desktop cryptocurrency wallets, messaging purposes like Telegram and Discord, and VPN purchasers.

The malware contains up to date privilege escalation strategies and maintains low detection charges on safety evaluation platforms, permitting it to evade conventional safety options.

Customers ought to disable Blender’s Auto Run function for untrusted file sources and train warning when downloading 3D fashions from neighborhood platforms.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Blender, Deliver, Files, Foundation, InfoStealer, Leverage, Notorious, StealC, Threat

Post navigation

Previous Post: Major US Banks Impacted by SitusAMC Hack
Next Post: WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation

Related Posts

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Cyber Security News
65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub Cyber Security News
Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Cyber Security News
Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Cyber Security News
Google Down For Most Of The Users In Turkey And Eastern Europe Cyber Security News
New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation
  • Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation
  • Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark