Article Details
Scrape Timestamp (UTC): 2025-11-25 11:31:56.680
Source: https://thehackernews.com/2025/11/hackers-hijack-blender-3d-assets-to.html
Original Article Text
Click to Toggle View
Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware. Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. "This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader," Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. "Users unknowingly download these 3D model files, which are designed to execute embedded Python scripts upon opening in Blender -- a free, open-source 3D creation suite." The cybersecurity company said the activity shares similarities with a prior campaign linked to Russian-speaking threat actors that involved impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2. This assessment is based on tactical similarities in both campaigns, including using decoy documents, evasive techniques, and background execution of malware. The latest set of attacks abuses the ability to embed Python scripts in .blend files like character rigs that are automatically executed when they are opened in scenarios where the Auto Run option is enabled. This behavior can be dangerous as it opens the door to the execution of arbitrary Python scripts. The security risk has been acknowledged by Blender in its own documentation, which states: "The ability to include Python scripts within blend-files is valuable for advanced tasks such as rigging and automation. However, it poses a security risk since Python does not restrict what a script can do." The attack chains essentially involve uploading malicious .blend files to free 3D asset sites such as CGTrader containing a malicious "Rig_Ui.py" script, which is executed as soon as they are opened with Blender's Auto Run feature enabled. This, in turn, fetches a PowerShell script to download two ZIP archives. While one of the ZIP files contains a payload for StealC V2, the second archive deploys a secondary Python-based stealer on the compromised host. The updated version of StealC, first announced in late April 2025, supports a wide range of information gathering features, allowing data to be extracted from 23 browsers, 100 web plugins and extensions, 15 cryptocurrency wallet apps, messaging services, VPNs, and email clients. "Keep Auto Run disabled unless the file source is trusted," Morphisec said. "Attackers exploit Blender that typically runs on physical machines with GPUs, bypassing sandboxes and virtual environments."
Daily Brief Summary
Cybersecurity researchers identified a campaign using Blender Foundation files to distribute the StealC V2 information stealer, active for over six months.
Attackers embed malicious Python scripts in .blend files on platforms like CGTrader, executing upon file opening when the Auto Run feature is enabled.
The campaign shares tactical similarities with previous attacks linked to Russian-speaking threat actors, targeting online gaming communities.
The malicious files download a PowerShell script to deploy StealC V2 and a secondary Python-based stealer, compromising host systems.
StealC V2 is capable of extracting data from 23 browsers, 100 web plugins, cryptocurrency wallets, messaging services, and more.
Blender's documentation warns of the security risks associated with Auto Run, advising users to disable it unless the file source is trusted.
The attack leverages Blender's capability to run on physical machines with GPUs, evading sandbox and virtual environment defenses.