Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials

Posted on October 23, 2025October 23, 2025 By CWS

A classy information-stealing malware often known as Vidar Stealer has undergone an entire architectural transformation with the discharge of model 2.0, introducing superior capabilities that allow it to bypass Chrome’s newest safety protections by way of direct reminiscence injection strategies.

Launched on October 6, 2025, by its developer “Loadbaks” on underground boards, this new iteration incorporates a full rewrite from C++ to pure C, implementing a multithreaded structure that considerably enhances its knowledge exfiltration velocity and evasion capabilities.

The timing of Vidar 2.0’s emergence coincides with a notable decline in Lumma Stealer exercise, positioning Vidar as a possible successor within the info stealer ecosystem.

Priced at $300 for lifetime entry, the malware presents cybercriminals a cheap but highly effective toolset able to systematically concentrating on credentials from browsers, cryptocurrency wallets, cloud companies, gaming platforms, and communication purposes together with Discord and Telegram.

The malware’s enhanced anti-analysis measures and complicated credential extraction strategies characterize a regarding evolution within the info stealer risk panorama.

Vidar developer saying the discharge of model 2.0 (Supply – Pattern Micro)

Vidar initially emerged in 2018 on Russian-language underground boards, initially leveraging the Arkei stealer supply code.

Over time, it has distinguished itself from opponents like Raccoon and RedLine by way of constant updates supporting new browsers, wallets, and two-factor authentication purposes.

Pattern Micro analysts recognized that the most recent model introduces 4 vital architectural modifications: an entire C language rewrite for enhanced stability and velocity, a multithreaded system that dynamically scales primarily based on sufferer pc specs, superior browser credential extraction capabilities, and an automated polymorphic builder that generates distinctive binary signatures for every construct.

The multithreaded structure represents one in every of Vidar 2.0’s most vital enhancements, permitting the malware to carry out knowledge assortment duties throughout a number of parallel threads.

This method mechanically adjusts efficiency by creating extra employee threads on highly effective programs and fewer threads on weaker machines, guaranteeing optimum operation with out overwhelming the goal.

The parallel processing considerably reduces the time the malware wants to stay energetic on compromised programs, making detection and intervention by safety software program considerably more difficult.

Chrome AppBound Encryption Bypass By Reminiscence Injection

Vidar 2.0’s most notable technical achievement includes its functionality to bypass Chrome’s AppBound encryption protections by way of subtle reminiscence injection strategies.

In keeping with the developer, the malware has “applied distinctive appBound strategies that aren’t discovered within the public area,” particularly concentrating on Chrome’s enhanced safety measures designed to stop unauthorized credential extraction by binding encryption keys to particular purposes.

This represents a direct problem to Chrome’s newest safety enhancements aimed toward defending consumer credentials from info stealers.

The malware employs a tiered method to browser credential extraction, initially trying conventional strategies similar to systematic enumeration of browser profiles and extraction of encryption keys from Native State information utilizing commonplace DPAPI decryption.

When these standard strategies fail towards Chrome’s AppBound encryption, Vidar 2.0 escalates to a complicated approach that launches goal browsers with debugging enabled and injects malicious code instantly into operating browser processes utilizing both shellcode or reflective DLL injection.

Vidar 2.0’s execution circulate (Supply – Pattern Micro)

The injected payload operates solely inside browser reminiscence, extracting encryption keys instantly from the energetic course of tackle house reasonably than trying to decrypt them from storage.

This memory-based method successfully circumvents Chrome’s AppBound encryption as a result of it steals keys which might be already decrypted and in use by the professional browser course of.

The stolen encryption keys are then communicated again to the principle malware course of by way of named pipes, a method that avoids creating disk artifacts that may very well be detected by forensic evaluation or safety software program.

This dual-pronged extraction technique concentrating on each conventional browser storage strategies and Chrome’s newest protections throughout a number of browser platforms together with Chrome, Firefox, Edge, and different Chromium-based browsers demonstrates the malware’s complete method to credential theft.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Browser, Bypassing, Credentials, Direct, Injection, Login, Memory, Security, Steal, Stealer, Vidar

Post navigation

Previous Post: Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
Next Post: Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens

Related Posts

DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News
BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies Cyber Security News
New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors Cyber Security News
CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks Cyber Security News
Building a Cyber-Resilient Organization in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News