A Russian-linked marketing campaign delivers the StealC V2 data stealer malware via malicious Blender recordsdata uploaded to 3D mannequin marketplaces like CGTrader.
Blender is a strong open-source 3D creation suite that may execute Python scripts for automation, customized consumer interface panels, add-ons, rendering processes, rigging instruments, and pipeline integration.
If the Auto Run function is enabled, when a consumer opens a personality rig, a Python script can robotically load the facial controls and customized UI panels with the required buttons and sliders.
Regardless of the potential for abuse, customers usually activate the Auto Run possibility for comfort.
Researchers at cybersecurity firm Morphisec noticed assaults utilizing malicious .mix recordsdata with embedded Python code that fetches a malware loader from a Cloudflare Staff area.

Supply: Morphisec
The loader then fetches a PowerShell script that retrieves two ZIP archives, ZalypaGyliveraV1Â and BLENDERX, from attacker-controlled IPs.
The archives unpack into the %TEMP% folder and drop LNK recordsdata within the Startup listing for persistence. Subsequent, they deploy two payloads, the StealC infostealer and an auxiliary Python stealer, possible used for redundancy.

Supply: Morphisec
Morphisec researchers report that the StealC malware used on this marketing campaign was the newest variant of the second main model of the malware that was analyzed by Zscaler researchers earlier this yr.
The newest StealC has expanded its data-stealing capabilities and helps exfiltration from:
- 23+ browsers, with server-side credential decryption and compatibility with Chrome 132+
- 100+ cryptocurrency pockets browser extensions and 15+ cryptocurrency pockets apps
- Telegram, Discord, Tox, Pidgin, VPN shoppers (ProtonVPN, OpenVPN), and mail shoppers (Thunderbird)
- Up to date UAC bypass mechanism
Regardless of the malware being documented since 2023, subsequent releases seem to stay elusive for anti-virus merchandise. Morphisec feedback that no safety engine on VirusTotal detected the StealC variant they analyzed.
Provided that 3D mannequin marketplaces can not scrutinize the code in user-submitted recordsdata, Blender customers are suggested to train warning when utilizing recordsdata sourced from such platforms and may contemplate disabling the auto-execution of code.
You are able to do this from Blender > Edit > Preferences > uncheck the ‘Auto Run Python Scripts’ possibility.
3D property needs to be handled like executable recordsdata, and customers ought to solely belief publishers with a confirmed file. For all the pieces else, it is strongly recommended to make use of sandboxed environments for testing.


