Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Vidar 2.0: The C-Rewritten Stealer Poised to Dominate the Cybercrime Market

31:42
 
Share
 

Manage episode 515133007 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechanisms. This overhaul not only boosts performance but makes detection exponentially more difficult, setting the stage for a potential new era in cybercrime operations.

Security researchers warn that infections from Vidar 2.0 are expected to surge through Q4 2025, as this reengineered variant fills the vacuum left by the decline of Lumma Stealer. The developer behind Vidar — active and trusted in underground markets since 2018 — has released a product that combines speed, stealth, and resilience into a single, deadly package.

The most alarming innovation is Vidar 2.0’s ability to bypass Chrome’s App-Bound encryption, a defense mechanism introduced in 2024 to protect browser-stored credentials. Instead of attempting to decrypt protected data on disk, Vidar 2.0 sidesteps these controls entirely by injecting malicious code directly into live Chrome processes and extracting encryption keys straight from memory. This in-memory attack vector effectively neutralizes one of the browser’s most advanced security protections.

Other major technical upgrades include:

  • A C-language rewrite, reducing dependencies and shrinking the malware’s footprint to evade signature detection.
  • Multi-threaded data collection, allowing it to steal multiple data types—passwords, cookies, cryptocurrency wallets, and cloud credentials—simultaneously, minimizing its dwell time on infected machines.
  • A polymorphic builder that automatically alters each build’s structure, producing unique, detection-resistant variants.
  • Robust anti-analysis defenses, from debugger and sandbox detection to hardware and timing checks that allow Vidar 2.0 to shut down in controlled environments.

Vidar 2.0’s operational flow reflects a professional-grade architecture. Once inside a victim’s system, it rapidly harvests data from browsers, crypto wallets, communication apps like Telegram and Discord, and even Steam accounts. After data collection, it captures screenshots and packages everything for exfiltration via Telegram bots or Steam-hosted URLs, cleverly leveraging legitimate services to conceal its communications.

From a market perspective, Vidar 2.0 is emerging as a clear successor to Lumma Stealer, offering superior capabilities at competitive prices. Its developer’s reputation, combined with its advanced architecture, ensures strong adoption within the Malware-as-a-Service (MaaS) economy. Trend Micro analysts predict Vidar 2.0 could become the dominant stealer in circulation by late 2025, reshaping the threat landscape for credential theft and data exfiltration.

For defenders, Vidar 2.0 underscores a broader trend in the cybercrime ecosystem: malware that’s not just faster and stealthier, but smarter and more adaptive. With its in-memory attacks and polymorphic evasion, this stealer exemplifies the next generation of threats that blend speed, sophistication, and commercial viability — a dangerous combination for enterprises and individuals alike.

#Vidar2 #Infostealer #Cybercrime #Malware #CredentialTheft #LummaStealer #TrendMicro #DataExfiltration #ChromeBypass #CyberThreat #InformationSecurity #ThreatIntelligence #MalwareAnalysis #CyberAttack #PolymorphicMalware #CyberDefense #MalwareAsAService #CProgramming #AIThreats #BrowserSecurity #EncryptionBypass #MemoryInjection #CyberSecurity #ThreatLandscape #Q42025

  continue reading

400 episodes

Artwork
iconShare
 
Manage episode 515133007 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechanisms. This overhaul not only boosts performance but makes detection exponentially more difficult, setting the stage for a potential new era in cybercrime operations.

Security researchers warn that infections from Vidar 2.0 are expected to surge through Q4 2025, as this reengineered variant fills the vacuum left by the decline of Lumma Stealer. The developer behind Vidar — active and trusted in underground markets since 2018 — has released a product that combines speed, stealth, and resilience into a single, deadly package.

The most alarming innovation is Vidar 2.0’s ability to bypass Chrome’s App-Bound encryption, a defense mechanism introduced in 2024 to protect browser-stored credentials. Instead of attempting to decrypt protected data on disk, Vidar 2.0 sidesteps these controls entirely by injecting malicious code directly into live Chrome processes and extracting encryption keys straight from memory. This in-memory attack vector effectively neutralizes one of the browser’s most advanced security protections.

Other major technical upgrades include:

  • A C-language rewrite, reducing dependencies and shrinking the malware’s footprint to evade signature detection.
  • Multi-threaded data collection, allowing it to steal multiple data types—passwords, cookies, cryptocurrency wallets, and cloud credentials—simultaneously, minimizing its dwell time on infected machines.
  • A polymorphic builder that automatically alters each build’s structure, producing unique, detection-resistant variants.
  • Robust anti-analysis defenses, from debugger and sandbox detection to hardware and timing checks that allow Vidar 2.0 to shut down in controlled environments.

Vidar 2.0’s operational flow reflects a professional-grade architecture. Once inside a victim’s system, it rapidly harvests data from browsers, crypto wallets, communication apps like Telegram and Discord, and even Steam accounts. After data collection, it captures screenshots and packages everything for exfiltration via Telegram bots or Steam-hosted URLs, cleverly leveraging legitimate services to conceal its communications.

From a market perspective, Vidar 2.0 is emerging as a clear successor to Lumma Stealer, offering superior capabilities at competitive prices. Its developer’s reputation, combined with its advanced architecture, ensures strong adoption within the Malware-as-a-Service (MaaS) economy. Trend Micro analysts predict Vidar 2.0 could become the dominant stealer in circulation by late 2025, reshaping the threat landscape for credential theft and data exfiltration.

For defenders, Vidar 2.0 underscores a broader trend in the cybercrime ecosystem: malware that’s not just faster and stealthier, but smarter and more adaptive. With its in-memory attacks and polymorphic evasion, this stealer exemplifies the next generation of threats that blend speed, sophistication, and commercial viability — a dangerous combination for enterprises and individuals alike.

#Vidar2 #Infostealer #Cybercrime #Malware #CredentialTheft #LummaStealer #TrendMicro #DataExfiltration #ChromeBypass #CyberThreat #InformationSecurity #ThreatIntelligence #MalwareAnalysis #CyberAttack #PolymorphicMalware #CyberDefense #MalwareAsAService #CProgramming #AIThreats #BrowserSecurity #EncryptionBypass #MemoryInjection #CyberSecurity #ThreatLandscape #Q42025

  continue reading

400 episodes

Toate episoadele

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play