Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vidar 2.0 Malware Targets Gamers via Fake Cheats

Vidar 2.0 Malware Targets Gamers via Fake Cheats

Posted on March 18, 2026 By CWS

The latest version of the Vidar infostealer, known as Vidar 2.0, is spreading aggressively through deceptive game cheat repositories on platforms like GitHub and Reddit. This malware masquerades as free cheats for popular online games, enticing gamers to unknowingly download a sophisticated tool designed to steal sensitive information.

Targeting Gamers with Fake Cheats

Malicious software hidden within gaming applications is a tactic that cybercriminals have exploited for years. By presenting fake key generators and cracked tools, attackers have increasingly targeted players of popular games such as Counter-Strike 2 (CS2), Fortnite, Valorant, and Call of Duty. These gamers, eager for free cheat tools, are often unsuspecting targets, likely to ignore security alerts, and possess valuable digital assets linked to their accounts.

Vidar 2.0’s Rise in the Cybercrime Landscape

Acronis analysts have identified active campaigns distributing Vidar 2.0, noting a surge in its use following the law enforcement takedowns of other infostealers like Lummastealer and Rhadamanthys. Vidar, which originated as a fork of the Arkei stealer in 2018, has evolved over seven years, offering cost-effective yet powerful features that appeal to cybercriminals.

Vidar 2.0 is capable of extracting browser credentials, cookies, autofill data, Azure tokens, cryptocurrency wallets, FTP and SSH credentials, and session data from services like Discord and Telegram. Its swift operation often leaves victims unaware until their data surfaces on underground markets, with compromised gaming accounts being particularly attractive due to the resale value of in-game items and currency.

Exploiting Trusted Platforms for Infections

Cybercriminals have advanced in exploiting trusted platforms, using GitHub to host landing pages that lend legitimacy to their operations. Reddit posts within gaming communities further direct users to these fake repositories. This strategic use of well-known platforms combined with targeted social engineering creates a deceptive infection pipeline that many users fail to recognize as harmful.

When users follow links from Reddit or visit fake GitHub pages, they encounter sites with seemingly legitimate installation instructions. These guides often instruct users to disable antivirus protections, extract password-protected archives, and execute files with administrative rights. Such steps are commonly associated with cheat software, making them appear routine to unsuspecting gamers.

How Vidar 2.0 Achieves Persistence

The infection process involves a PowerShell script compiled into a .NET binary, confirmed by Detect It Easy (DIE) analysis. Once executed, the loader creates a Windows Defender exclusion for a specific folder, preventing security scans on its contents. It then retrieves the next-stage payload from GitHub, placing it in a hidden folder within the %AppData% directory as ‘background.exe’.

Persistence is ensured through a scheduled task named ‘SystemBackgroundUpdate’, configured to execute automatically at user login with elevated privileges. The final payload, a Themida-packed Vidar 2.0 binary, utilizes Telegram bots and Steam profiles as dead drop resolvers to conceal its command-and-control infrastructure, complicating detection by security teams.

To combat such threats, users and organizations should employ endpoint protection or EDR tools to detect unusual process chains and data exfiltration activities. Keeping operating systems and applications updated is crucial to addressing known vulnerabilities. Additionally, restricting software execution in non-standard paths and downloading software exclusively from official or verified sources are essential precautions.

For more insights and updates, follow us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for real-time cybersecurity news.

Cyber Security News Tags:Acronis, credential theft, cyber threats, Cybercrime, Cybersecurity, data protection, fake cheats, Gaming, gaming security, GitHub, InfoStealer, Malware, online security, Reddit, Vidar 2.0

Post navigation

Previous Post: WhatsApp View Once Bypass Found, Meta Won’t Fix
Next Post: Mesh CSMA: Breaking Attack Paths to Sensitive Data

Related Posts

Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Cyber Security News
Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Cyber Security News
TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses Cyber Security News
Weak Password Let Ransomware Gang Destroy 158-Year-Old Company Weak Password Let Ransomware Gang Destroy 158-Year-Old Company Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack
  • Understanding Magecart Threats in Web Supply Chains
  • Remote Code Execution Risk in Telnetd Impacts Security
  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack
  • Understanding Magecart Threats in Web Supply Chains
  • Remote Code Execution Risk in Telnetd Impacts Security
  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark