Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

The Hacker News by The Hacker News
November 25, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Nov 25, 2025Ravie LakshmananMalware / Browser Security

Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2.

“This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News.

“Users unknowingly download these 3D model files, which are designed to execute embedded Python scripts upon opening in Blender — a free, open-source 3D creation suite.”

DFIR Retainer Services

The cybersecurity company said the activity shares similarities with a prior campaign linked to Russian-speaking threat actors that involved impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2.

This assessment is based on tactical similarities in both campaigns, including using decoy documents, evasive techniques, and background execution of malware.

The latest set of attacks abuses the ability to embed Python scripts in .blend files like character rigs that are automatically executed when they are opened in scenarios where the Auto Run option is enabled. This behavior can be dangerous as it opens the door to the execution of arbitrary Python scripts.

The security risk has been acknowledged by Blender in its own documentation, which states: “The ability to include Python scripts within blend-files is valuable for advanced tasks such as rigging and automation. However, it poses a security risk since Python does not restrict what a script can do.”

The attack chains essentially involve uploading malicious .blend files to free 3D asset sites such as CGTrader containing a malicious “Rig_Ui.py” script, which is executed as soon as they are opened with Blender’s Auto Run feature enabled. This, in turn, fetches a PowerShell script to download two ZIP archives.

CIS Build Kits

While one of the ZIP files contains a payload for StealC V2, the second archive deploys a secondary Python-based stealer on the compromised host. The updated version of StealC, first announced in late April 2025, supports a wide range of information gathering features, allowing data to be extracted from 23 browsers, 100 web plugins and extensions, 15 cryptocurrency wallet apps, messaging services, VPNs, and email clients.

“Keep Auto Run disabled unless the file source is trusted,” Morphisec said. “Attackers exploit Blender that typically runs on physical machines with GPUs, bypassing sandboxes and virtual environments.”



Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Can Tech Get Rid of Bad Trips?

Can Tech Get Rid of Bad Trips?

Recommended.

HONOR appelle à une collaboration ouverte dans le cadre d’une nouvelle vision de l’écosystème de l’IA, alors que de nouvelles possibilités s’offrent aux dispositifs d’IA

HONOR appelle à une collaboration ouverte dans le cadre d’une nouvelle vision de l’écosystème de l’IA, alors que de nouvelles possibilités s’offrent aux dispositifs d’IA

March 3, 2026
Higgsfield Launches Similarity-Scoring Tool for Responsible AI Use in Media and Entertainment

Higgsfield Launches Similarity-Scoring Tool for Responsible AI Use in Media and Entertainment

March 13, 2026

Trending.

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

November 19, 2025
Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

April 23, 2025
Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

May 5, 2025
Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

February 7, 2025
Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

May 8, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio