New StealC V2 Malware Targets Blender Users via Malicious Files

Cybercriminals exploit Blender's .blend files with embedded Python scripts to deploy StealC V2 malware targeting 3D asset users on platforms like CGTrader, stealing extensive data and leveraging Blender's Auto Run feature for automatic execution.

  • Hackers have launched a campaign using malicious .blend files to spread the StealC V2 information stealer.
  • The attack targets users downloading 3D assets from sites like CGTrader, relying on embedded Python scripts executed by Blender software.
  • The Malware steals data from browsers, cryptocurrency wallets, messaging apps, VPNs, and email clients.
  • The campaign shows links to previous Russian-speaking threat actors known for similar tactics.
  • Blender’s Auto Run feature enables the automatic execution of harmful scripts contained in .blend files.

Cybersecurity researchers uncovered a campaign active for over six months exploiting Blender Foundation’s file format. Malicious .blend files were distributed on platforms such as CGTrader. When opened using the Blender 3D creation suite with its Auto Run feature enabled, these files execute embedded Python scripts designed to install the StealC V2 information stealer.

- Advertisement -

The attackers upload .blend files containing a harmful script named “Rig_Ui.py.” Upon opening, this script runs automatically and triggers a PowerShell command that downloads two ZIP archives. One contains the StealC V2 payload, while the other installs a secondary Python-based stealer on the infected device. StealC V2 gathers information from 23 web browsers, 100 plugins and extensions, 15 cryptocurrency wallet applications, various messaging services, VPN software, and email clients.

According to statements from Morphisec researcher Shmuel Uzan, this campaign shares tactics with a previous operation linked to Russian-speaking threat groups. Similarities include the use of decoy documents, stealth techniques, and background malware execution. Those earlier attacks impersonated organizations like the Electronic Frontier Foundation (EFF) to target online gamers.

The risk arises because Blender permits Python scripts inside .blend files for advanced tasks like character rigging and automation. This capability also allows arbitrary scripts to run, which can be exploited if the Auto Run option is turned on. Blender has acknowledged this security risk on its official documentation, explaining the unrestricted nature of embedded Python scripts.

Users are advised to keep the Auto Run feature disabled unless files are from trusted sources to reduce infection risk. Attackers leverage Blender’s typical use on physical machines with GPUs to bypass Sandbox and virtual environments, increasing the potential impact of this malicious campaign. For further details, see the Morphisec report and Blender’s security documentation.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Decade-Old DAO Contract Saved in $100K Whitehat Rescue

A whitehat rescue mission on Feb. 4, 2026, successfully secured over 50 ETH (worth...

Bitcoin Dips to 15-Month Low, $70K Support Tested

Bitcoin Price fell below $72,500 on Wednesday, setting a new 15-month low and erasing...

MSFT, PYPL Face Pressure Despite S&P 500 Rally

The S&P 500 has hit record highs amid a disruptive AI-driven market surge.Paypal (PYPL)...

Amazon in OpenAI Talks for Custom AI, Investment

Amazon is negotiating a commercial deal for "special access" to OpenAI's technology, aiming to...

Canaccord Slashes MSTR Target 61%, Sees 40% Upside

Canaccord's Joseph Vafi slashed his price target on Strategy by 61% to $185, maintaining...
- Advertisement -

Must Read

7 Best Crypto To Invest In This Year

Investing in cryptocurrencies has become a popular way for people to diversify their investment portfolio and make potential profits.However, with so many cryptocurrencies available...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!