Vidar Malware Attacks Browser Passwords, Crypto Wallets and Cookies for Financial Gain

www.news4hackers.com-vidar-malware-attacks-browser-passwords-crypto-wallets-and-cookies-for-financial-gain-vidar-malware-attacks-browser-passwords-crypto-wallets-and-cookies-for-financial-gain

Password Stealers Evolve: Vidar Malware Targets Browser Credentials and Cryptocurrency Wallets

Cybersecurity researchers have identified a sophisticated malware campaign utilizing the Vidar information stealer, which has been active since 2018.

According to cybersecurity experts, “Vidar checks for active security processes, disables monitoring tools, and executes a loader compiled using AutoIt scripting techniques.”

The Infection Chain:

  • A seemingly legitimate software activation tool, such as “MicrosoftToolkit.exe,” deceives users into executing the malware manually.
  • Once launched, the initial file triggers a series of hidden scripts, renaming and executing a disguised file as a batch process, followed by additional payload extraction stages.
  • Vidar scans infected systems for stored browser credentials, authentication cookies, saved passwords, and cryptocurrency wallet files.
  • The malware communicates with external infrastructure disguised as legitimate traffic, using platforms such as Telegram and Steam to blend malicious activity with normal web traffic.
  • Vidar exhibits self-cleaning behavior, deleting dropped files, clearing execution traces, resetting file attributes, and terminating its own processes.

Action Against Vidar Attacks:

  • Isolate potentially infected systems.
  • Perform a full system reimage.
  • Reset all credentials.
  • Enforce multi-factor authentication.
  • Restrict execution of unauthorized software tools.
  • Monitor outbound network traffic, DNS requests, and unusual HTTP connections.



About Author

en_USEnglish