Article Details
Scrape Timestamp (UTC): 2025-10-21 22:30:47.861
Original Article Text
Click to Toggle View
Vidar Stealer 2.0 adds multi-threaded data theft, better evasion. Security researchers are warning that Vidar Stealer infections are likely to increase after the malware developer released a new major version with upgraded capabilities. According to an announcement from the developer this month, Vidar 2.0 has been rewritten in C, supports multi-threading data stealing, bypasses Chrome's app-bound encryption, and features more advanced evasion mechanisms. Infostealer malware specializes in stealing data from browsers and other apps, including passwords, credit card information, and cryptocurrency wallet information. The release of Vidar 2.0 comes at a time when Lumma Stealer, another major player in the field, has shown a rapid decline in activity, following a doxing campaign against its key operators. Vidar 2.0 targets a broad range of data, including browser cookies and autofill, cryptocurrency wallet extensions and desktop apps, cloud credentials, Steam accounts, Telegram, and Discord data. According to a report from Trend Micro researchers, Vidar activity has spiked since the release of its second major version, which comes with the following highlights: "The malware also employs an advanced technique that launches browsers with debugging enabled and injects malicious code directly into running browser processes using either shellcode or reflective DLL injection," explains Trend Micro. "The injected payload extracts encryption keys directly from browser memory, then communicates the stolen keys back to the main malware process via named pipes to avoid disk artifacts." "This approach can bypass Chrome's AppBound encryption protections by stealing keys from active memory rather than attempting to decrypt them from storage." Chrome's AppBound encryption, introduced in July 2024, has been bypassed by multiple info-stealer malware families over time. Once Vidar 2.0 collects all the data it can access on the infected machine, it captures screenshots, packages everything, and sends it to delivery points that include Telegram bots and URLs stored on Steam profiles. Trend Micro researchers expect Vidar 2.0 to become more prevalent in campaigns through Q4 2025 as the "malware's technical capabilities, proven developer track record since 2018, and competitive pricing position it as a likely successor to Lumma Stealer's dominant market position." Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Vidar Stealer 2.0 has been released with significant upgrades, including multi-threading, improved data theft capabilities, and advanced evasion techniques, posing increased risks to businesses and individuals.
The malware targets a wide array of data sources, such as browser cookies, cryptocurrency wallets, cloud credentials, and popular platforms like Steam, Telegram, and Discord.
Vidar 2.0 employs sophisticated methods to bypass Chrome's AppBound encryption, extracting keys from active memory and communicating them via named pipes to avoid detection.
The release coincides with a decline in Lumma Stealer activity, positioning Vidar 2.0 as a potential leader in the info-stealer market due to its advanced features and competitive pricing.
Trend Micro reports a spike in Vidar activity, predicting its increased prevalence in cyber campaigns through Q4 2025, driven by its technical capabilities and developer reputation.
Organizations should enhance their cybersecurity measures to detect and mitigate the risks posed by this advanced malware, focusing on browser security and data protection strategies.