Blog

Vidar Stealer 2.0 adds multi-threaded data theft, better evasion

Security researchers are warning that Vidar Stealer infections are likely to increase after the malware developer released a new major version with upgraded capabilities.

According to an announcement from the developer this month, Vidar 2.0 has been rewritten in C, supports multi-threading data stealing, bypasses Chrome’s app-bound encryption, and features more advanced evasion mechanisms.

Infostealer malware specializes in stealing data from browsers and other apps, including passwords, credit card information, and cryptocurrency wallet information.

Vidar 2.0 release announcement
Vidar 2.0 release announcement
Source: Trend Micro

The release of Vidar 2.0 comes at a time when Lumma Stealer, another major player in the field, has shown a rapid decline in activity, following a doxing campaign against its key operators.

Vidar 2.0 targets a broad range of data, including browser cookies and autofill, cryptocurrency wallet extensions and desktop apps, cloud credentials, Steam accounts, Telegram, and Discord data.

Data Vidar 2.0 targets
Data Vidar 2.0 targets
Source: Trend Micro

According to a report from Trend Micro researchers, Vidar activity has spiked since the release of its second major version, which comes with the following highlights:

  • Complete rewrite from C++ to C, now relying on fewer dependencies and having better raw performance at a much smaller footprint.
  • Multi-thread CPU support where data-stealing worker threads are spawned simultaneously to parallelize collection and reduce dwell time.
  • Extensive anti-analysis checks, including debugger detection, timing checks, uptime, and hardware profiling.
  • Builder offers polymorphism options with heavy control-flow flattening and numeric state-machine switch constructs, making static detection more difficult.
  • Evasion of Chrome’s App-Bound encryption protection by means of memory injection techniques.

“The malware also employs an advanced technique that launches browsers with debugging enabled and injects malicious code directly into running browser processes using either shellcode or reflective DLL injection,” explains Trend Micro.

“The injected payload extracts encryption keys directly from browser memory, then communicates the stolen keys back to the main malware process via named pipes to avoid disk artifacts.”

“This approach can bypass Chrome’s AppBound encryption protections by stealing keys from active memory rather than attempting to decrypt them from storage.”

Retrieval of encryption keys from memory
Retrieval of encryption keys from memory
Source: Trend Micro

Chrome’s AppBound encryption, introduced in July 2024, has been bypassed by multiple info-stealer malware families over time.

Once Vidar 2.0 collects all the data it can access on the infected machine, it captures screenshots, packages everything, and sends it to delivery points that include Telegram bots and URLs stored on Steam profiles.

Trend Micro researchers expect Vidar 2.0 to become more prevalent in campaigns through Q4 2025 as the “malware’s technical capabilities, proven developer track record since 2018, and competitive pricing position it as a likely successor to Lumma Stealer’s dominant market position.”

46% of environments had passwords cracked, nearly doubling from 25% last year.

Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.


Source link

See also  LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data
Back to top button
close