Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why “hold forever” investors catch venture capital “zombies”

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

OpenAI and Perplexity are launching AI shopping assistants, but competing startups aren’t keen on it

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers hijack Blender 3D assets and deploy StealC V2 data-stealing malware
Identity

Hackers hijack Blender 3D assets and deploy StealC V2 data-stealing malware

userBy userNovember 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 25, 2025Ravi LakshmananMalware/Browser Security

Cybersecurity researchers have revealed details of a new campaign that leverages Blender Foundation files to distribute an information theft tool known as StealC V2.

“This ongoing operation, which has been active for at least six months, involves embedding malicious .blend files into platforms such as CGTrader,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News.

“Users unknowingly download these 3D model files, which are designed to run embedded Python scripts when opened in Blender, a free, open-source 3D creation suite.”

DFIR retainer service

The cybersecurity firm said this activity has similarities to previous campaigns involving Russian-speaking attackers that impersonated the Electronic Frontier Foundation (EFF) to target online gaming communities and infect them with StealC and Pyramid C2.

This assessment is based on tactical similarities between both campaigns, including the use of decoy documents, evasion techniques, and background execution of malware.

The latest set of attacks exploits the ability to embed Python scripts in .blend files, such as character rigs, that are automatically executed when the file is opened in scenarios where the autorun option is enabled. This behavior is potentially dangerous as it opens the door to the execution of arbitrary Python scripts.

Blender acknowledges this security risk in its own documentation, stating: “The ability to include Python scripts within blend files is valuable for advanced tasks such as rigging and automation. However, Python does not limit what the scripts can do, which poses a security risk.”

This attack chain essentially involves uploading a malicious .blend file containing the malicious “Rig_Ui.py” script to a free 3D asset site such as CGTrader. This script runs as soon as it is opened with Blender’s autorun feature enabled. This will retrieve a PowerShell script and download two ZIP archives.

CIS build kit

One of the ZIP files contains the StealC V2 payload, while the second archive deploys a secondary Python-based stealer on the compromised host. First announced in late April 2025, the updated version of StealC supports a wide range of information collection features and can extract data from 23 browsers, 100 web plugins and extensions, 15 crypto wallet apps, messaging services, VPNs, and email clients.

“Keep autorun disabled unless you trust the file source,” Morphisec said. “Attackers typically exploit Blender, which runs on physical machines with GPUs, to bypass sandboxes and virtual environments.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article‘Never seen a skull like this before’: Medieval Spanish knight who died in battle had a rare genetic disorder, study finds
Next Article Study finds elevated levels of microplastics contribute to AMR
user
  • Website

Related Posts

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

November 25, 2025

Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys

November 25, 2025

JackFix uses fake Windows Update pop-ups on adult sites to distribute multiple thieves

November 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why “hold forever” investors catch venture capital “zombies”

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

OpenAI and Perplexity are launching AI shopping assistants, but competing startups aren’t keen on it

Find Your Grind raises $5 million to grow platform that lets students explore unique career paths

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.