Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials

Posted on October 23, 2025October 23, 2025 By CWS

A classy information-stealing malware often known as Vidar Stealer has undergone an entire architectural transformation with the discharge of model 2.0, introducing superior capabilities that allow it to bypass Chrome’s newest safety protections by way of direct reminiscence injection strategies.

Launched on October 6, 2025, by its developer “Loadbaks” on underground boards, this new iteration incorporates a full rewrite from C++ to pure C, implementing a multithreaded structure that considerably enhances its knowledge exfiltration velocity and evasion capabilities.

The timing of Vidar 2.0’s emergence coincides with a notable decline in Lumma Stealer exercise, positioning Vidar as a possible successor within the info stealer ecosystem.

Priced at $300 for lifetime entry, the malware presents cybercriminals a cheap but highly effective toolset able to systematically concentrating on credentials from browsers, cryptocurrency wallets, cloud companies, gaming platforms, and communication purposes together with Discord and Telegram.

The malware’s enhanced anti-analysis measures and complicated credential extraction strategies characterize a regarding evolution within the info stealer risk panorama.

Vidar developer saying the discharge of model 2.0 (Supply – Pattern Micro)

Vidar initially emerged in 2018 on Russian-language underground boards, initially leveraging the Arkei stealer supply code.

Over time, it has distinguished itself from opponents like Raccoon and RedLine by way of constant updates supporting new browsers, wallets, and two-factor authentication purposes.

Pattern Micro analysts recognized that the most recent model introduces 4 vital architectural modifications: an entire C language rewrite for enhanced stability and velocity, a multithreaded system that dynamically scales primarily based on sufferer pc specs, superior browser credential extraction capabilities, and an automated polymorphic builder that generates distinctive binary signatures for every construct.

The multithreaded structure represents one in every of Vidar 2.0’s most vital enhancements, permitting the malware to carry out knowledge assortment duties throughout a number of parallel threads.

This method mechanically adjusts efficiency by creating extra employee threads on highly effective programs and fewer threads on weaker machines, guaranteeing optimum operation with out overwhelming the goal.

The parallel processing considerably reduces the time the malware wants to stay energetic on compromised programs, making detection and intervention by safety software program considerably more difficult.

Chrome AppBound Encryption Bypass By Reminiscence Injection

Vidar 2.0’s most notable technical achievement includes its functionality to bypass Chrome’s AppBound encryption protections by way of subtle reminiscence injection strategies.

In keeping with the developer, the malware has “applied distinctive appBound strategies that aren’t discovered within the public area,” particularly concentrating on Chrome’s enhanced safety measures designed to stop unauthorized credential extraction by binding encryption keys to particular purposes.

This represents a direct problem to Chrome’s newest safety enhancements aimed toward defending consumer credentials from info stealers.

The malware employs a tiered method to browser credential extraction, initially trying conventional strategies similar to systematic enumeration of browser profiles and extraction of encryption keys from Native State information utilizing commonplace DPAPI decryption.

When these standard strategies fail towards Chrome’s AppBound encryption, Vidar 2.0 escalates to a complicated approach that launches goal browsers with debugging enabled and injects malicious code instantly into operating browser processes utilizing both shellcode or reflective DLL injection.

Vidar 2.0’s execution circulate (Supply – Pattern Micro)

The injected payload operates solely inside browser reminiscence, extracting encryption keys instantly from the energetic course of tackle house reasonably than trying to decrypt them from storage.

This memory-based method successfully circumvents Chrome’s AppBound encryption as a result of it steals keys which might be already decrypted and in use by the professional browser course of.

The stolen encryption keys are then communicated again to the principle malware course of by way of named pipes, a method that avoids creating disk artifacts that may very well be detected by forensic evaluation or safety software program.

This dual-pronged extraction technique concentrating on each conventional browser storage strategies and Chrome’s newest protections throughout a number of browser platforms together with Chrome, Firefox, Edge, and different Chromium-based browsers demonstrates the malware’s complete method to credential theft.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Browser, Bypassing, Credentials, Direct, Injection, Login, Memory, Security, Steal, Stealer, Vidar

Post navigation

Previous Post: Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
Next Post: Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens

Related Posts

CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News
New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Cyber Security News
Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
10 Best Malware Analysis Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors
  • New Android Malware Frogblight Mimics as Official Government Websites to Collect SMS and Device Details
  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
  • Wireshark 4.6.2 Released With Fix for Vulnerabilities, and Updated Protocol Support

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors
  • New Android Malware Frogblight Mimics as Official Government Websites to Collect SMS and Device Details
  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
  • Wireshark 4.6.2 Released With Fix for Vulnerabilities, and Updated Protocol Support

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark