Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

October 25, 2025

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

October 25, 2025

Threat Actors Ramp Up Public App Exploits as ToolShell Gains Traction

October 24, 2025
Facebook X (Twitter) Instagram
Saturday, October 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer
News

Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer

Team-CWDBy Team-CWDOctober 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An established information stealer (infostealer) has recently been upgraded with enhanced capabilities and filled a vacuum left by the decline of the once-dominant Lumma Stealer.

According to a Trend Micro report published on October 21, a new version of the Vidar infostealer has emerged, with a new multithreaded architecture for faster, more efficient data exfiltration and improved evasion capabilities.

The upgrade, dubbed Vidar 2.0, was first announced by a developer known as “Loadbaks” on underground forums on October 6.

Its release coincides with a decline in activity surrounding Lumma Stealer, which had been the dominant infostealer strain for months before a law enforcement operation disrupted a big part of Lumma’s infrastructure in 2024 and a doxxing campaign targeted its developers between August and October 2025.

These subsequent events lead to a decline in Lumma’s activity.

Introducing Vidar 2.0

Vidar first emerged in 2018 on Russian-language underground forums, initially leveraging the Arkei stealer source code.

Vidar quickly gained traction due to its reliable support and comprehensive ability to steal browser credentials and cryptocurrency wallets. Its price tag of $300 for lifetime use was also attractive.

“Over the years, Vidar set itself apart from competitors like Raccoon and RedLine by consistently adding support for new browsers, wallets and two-factor authentication (2FA) applications, maintaining a loyal user base through ongoing updates and reliable developer support,” the Trend Micro researchers wrote.

Vidar recently established itself as one of the main competitors to become the market leader after the decline of Lumma.

In the first major upgrade since its inception, Vidar 2.0 comes with four significant changes:

  • Complete C language rewrite: the development team rewrote the entire software from C++ to C, which allowed “a huge increase in stability and speed,” said Trend Micro
  • Multithreaded data theft capabilities, promising faster data collection and exfiltration through parallel processing capabilities that can leverage modern multi-core processor architectures
  • New custom-made browser credential extraction and AppBound bypass techniques: this latter capability specifically targets Chrome’s enhanced security measures introduced in recent versions, claiming to bypass application-bound encryption that was designed to prevent unauthorized credential extraction by binding encryption keys to specific applications
  • Automatic polymorphic builder, a feature designed to generate samples with distinct binary signatures, making static detection methods more difficult

“As Lumma Stealer activity continues to decline and underground actors migrate to Vidar and StealC alternatives, security teams should anticipate increased Vidar 2.0 prevalence in campaigns through Q4 2025,” the Trend Micro researchers warned.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow Threat Hunting Builds Readiness
Next Article Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Team-CWD
  • Website

Related Posts

News

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

October 25, 2025
News

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

October 25, 2025
News

Threat Actors Ramp Up Public App Exploits as ToolShell Gains Traction

October 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.