Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Smishing Triad Impersonation Campaigns Expand Globally

November 25, 2025

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

November 25, 2025

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

November 25, 2025
Facebook X (Twitter) Instagram
Tuesday, November 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Russian-linked Malware Campaign Hides in Blender 3D Files
News

Russian-linked Malware Campaign Hides in Blender 3D Files

Team-CWDBy Team-CWDNovember 24, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months.

According to a new advisory by Morphisec, the attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets.

When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection.

StealC V2 Expands Reach Through Weaponized Blender Assets

The research, published today, connects this activity to Russian-speaking threat actors previously associated with StealC distribution.

The campaign mirrors an earlier effort that impersonated the Electronic Frontier Foundation (EFF) to target Albion Online players, sharing elements such as decoy content, background execution and Pyramid C2 infrastructure.

The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file. This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers.

Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads.

Read more on LNK-based security threats: Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups

StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set. It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients. Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools.

Attribution and Indicators of Compromise

Several indicators of compromise (IoCs) surfaced during the investigation, including:

  • Malicious .blend files hosted on CGTrader

  • Payload retrieval through multiple workers.dev domains

  • ZIP archives containing Python stealers and persistence components

  • Command-and-control (C2) communication across several Pyramid-linked IPs

Morphisec attributes its early blocking of this campaign to its deception-based protection platform. By injecting decoy credentials into memory and browser storage, the system triggers prevention when StealC attempts to access them. Processes are terminated before exfiltration or persistence can occur. 

The researchers say this approach transforms credential theft attempts into failures, stopping StealC V2 long before it can gain a foothold on an endpoint.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
Next Article Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies
Team-CWD
  • Website

Related Posts

News

Smishing Triad Impersonation Campaigns Expand Globally

November 25, 2025
News

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

November 25, 2025
News

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

November 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.