Vidar 2.0 Infostealer Spreads via Fake Game Cheats on GitHub and Reddit
Newly Discovered Campaign Spreads Vidar 2.0 Infostealer via Fake Game Cheats on GitHub
A newly discovered campaign is spreading a sophisticated infostealer, known as Vidar 2.0, through fake game cheats hosted on GitHub. The malware targets gamers, particularly younger players, who are tempted by the promise of free cheats for popular games like Fortnite and Counter-Strike.
Vidar 2.0: A Master of Digital Theft
The Vidar 2.0 infostealer is a master of digital theft, capable of stealing sensitive information such as cryptocurrency wallets, login tokens, and files. It also targets Microsoft Azure folders and professional tools like FileZilla to gain access to server passwords and potentially compromise workplace networks. The malware takes a screenshot of the user’s desktop and copies files from the Documents folder, making it a highly invasive threat.
The attackers use technical tricks like PowerShell scripts to drop the virus quietly, and the malware is designed to run every time the user logs in. It also has the ability to detect and refuse to run in a security researcher’s virtual environment, making it a challenging threat to detect.
Technical Rewrite and Malware-as-a-Service (MaaS)
Vidar 2.0 has undergone a significant technical rewrite, switching from C++ to C, making it faster and stealthier. The malware operates as Malware-as-a-Service (MaaS), with criminals paying between $130 and $750 to use it. The recent shutdown of its main rivals, Lumma and Rhadamanthys, has led to a surge in Vidar’s popularity.
Stealthy and Sophisticated Threat
The malware uses Telegram bots and Steam profiles as dead drop locations to receive hidden instructions, allowing it to blend in with normal traffic and complete its mission before the victim realizes something is wrong. This highlights the importance of being cautious when downloading software from untrusted sources and the need for robust security measures to protect against sophisticated threats like Vidar 2.0.
Underestimated Scale and Vigilance Required
The researchers noted that the true scale of the campaign is likely underestimated, with hundreds of malicious pages identified, but the actual number could be in the thousands. The use of GitHub and other platforms to distribute the malware makes it a significant threat, and users are advised to be vigilant when downloading software from these sources.
