Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Posted on November 25, 2025November 25, 2025 By CWS

Nov 25, 2025Ravie LakshmananMalware / Browser Safety
Cybersecurity researchers have disclosed particulars of a brand new marketing campaign that has leveraged Blender Basis information to ship an info stealer often called StealC V2.
“This ongoing operation, energetic for not less than six months, entails implanting malicious .mix information on platforms like CGTrader,” Morphisec researcher Shmuel Uzan mentioned in a report shared with The Hacker Information.
“Customers unknowingly obtain these 3D mannequin information, that are designed to execute embedded Python scripts upon opening in Blender — a free, open-source 3D creation suite.”

The cybersecurity firm mentioned the exercise shares similarities with a previous marketing campaign linked to Russian-speaking menace actors that concerned impersonating the Digital Frontier Basis (EFF) to focus on the net gaming group and infect them with StealC and Pyramid C2.
This evaluation is predicated on tactical similarities in each campaigns, together with utilizing decoy paperwork, evasive strategies, and background execution of malware.
The most recent set of assaults abuses the power to embed Python scripts in .mix information like character rigs which might be robotically executed when they’re opened in situations the place the Auto Run choice is enabled. This habits might be harmful because it opens the door to the execution of arbitrary Python scripts.

The safety threat has been acknowledged by Blender in its personal documentation, which states: “The power to incorporate Python scripts inside blend-files is efficacious for superior duties comparable to rigging and automation. Nonetheless, it poses a safety threat since Python doesn’t prohibit what a script can do.”
The assault chains primarily contain importing malicious .mix information to free 3D asset websites comparable to CGTrader containing a malicious “Rig_Ui.py” script, which is executed as quickly as they’re opened with Blender’s Auto Run function enabled. This, in flip, fetches a PowerShell script to obtain two ZIP archives.

Whereas one of many ZIP information incorporates a payload for StealC V2, the second archive deploys a secondary Python-based stealer on the compromised host. The up to date model of StealC, first introduced in late April 2025, helps a variety of knowledge gathering options, permitting knowledge to be extracted from 23 browsers, 100 net plugins and extensions, 15 cryptocurrency pockets apps, messaging companies, VPNs, and e mail purchasers.
“Preserve Auto Run disabled except the file supply is trusted,” Morphisec mentioned. “Attackers exploit Blender that usually runs on bodily machines with GPUs, bypassing sandboxes and digital environments.”

The Hacker News Tags:Assets, Blender, DataStealing, Deploy, Hackers, Hijack, Malware, StealC

Post navigation

Previous Post: 640 NPM Packages Infected in New ‘Shai-Hulud’ Supply Chain Attack
Next Post: 3 SOC Challenges You Need to Solve Before 2026

Related Posts

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues The Hacker News
Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions The Hacker News
Securing CI/CD workflows with Wazuh The Hacker News
How to Detect Phishing Attacks Faster: Tycoon2FA Example The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation
  • Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation
  • Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark