What's Happening?
A cyberattack campaign linked to Russian threat actors has been utilizing trojanized .blend files on platforms like CGTrader to distribute the StealC V2 information-stealing malware. These files, when opened using Blender's Auto Run feature, execute a tampered
script that downloads a loader, leading to the deployment of malware. The StealC V2 malware is capable of extracting data from over two dozen browsers, desktop wallets, and various applications. The campaign, ongoing for at least six months, was thwarted by Morphisec using its deception-based protection platform.
Why It's Important?
This cyberattack highlights the vulnerabilities in digital asset platforms and the potential risks associated with downloading files from unverified sources. The use of Blender 3D files as a vector for malware distribution underscores the need for enhanced security measures in creative software environments. The ability of StealC V2 to target a wide range of applications poses significant threats to individual privacy and data security. Organizations and individuals must remain vigilant and adopt robust cybersecurity practices to protect against such sophisticated attacks.
What's Next?
The ongoing threat from StealC V2 may prompt increased scrutiny and security enhancements on platforms hosting digital assets. Developers and users of Blender and similar software might see updates aimed at closing vulnerabilities exploited by malware. Cybersecurity firms are likely to continue monitoring and developing countermeasures against evolving threats. Awareness campaigns and educational initiatives could be launched to inform users about safe practices when downloading and using digital files.












