Blender Bait: StealC V2 Sneaks into 3D Files, Targets Artists Worldwide
StealC V2 is taking the art of cybercrime to a new level, disguising its sinister intentions within seemingly innocent Blender project files. Download a 3D asset today, get a malware infection free! Just make sure your Auto Run feature is off, or you’ll be in for a not-so-pleasant surprise.

Hot Take:
Who knew that 3D art could come with a side of cybercrime? With StealC V2 making a cameo in Blender files, it’s like opening a Trojan Horse only to find a Python inside. Beware of art projects bearing gifts, especially if they come with an Auto Run feature!
Key Points:
- StealC V2 malware is being cleverly hidden within Blender project files, targeting unsuspecting 3D artists.
- The attack utilizes Blender’s Auto Run feature to execute hidden Python scripts and begin a complex infection chain.
- Russian-speaking threat actors, familiar with StealC distribution, are suspected to be behind these operations.
- Morphisec’s deception-based protection plays the hero, thwarting the malware by turning credential theft into an epic fail.
- StealC V2 has evolved to target a wide range of applications, making it the Swiss Army knife of malware.
Already a member? Log in here
