When 3D Models Attack: StealC V2 Malware Lurks in Blender Files!
Beware of Blender files from 3D model marketplaces—they might come with a side of StealC V2 malware! This Russian-linked campaign uses malicious Blender files to sneakily deliver malware. Remember, if it looks too good to be true, it probably needs a sandbox! Stay safe, and check your Auto Run settings.

Hot Take:
When cybercriminals start using a software suite named Blender to cook up their malware smoothies, you know the digital world is getting spicy! Blender files, akin to your grandma’s secret cookie recipe, should be cherished, but definitely not trusted unless you’re sure they don’t contain a surprise ingredient like StealC V2 malware. Consider them as potential Trojan horses—except these aren’t filled with Greeks, just sneaky lines of code ready to raid your data pantry.
Key Points:
– Malware campaign uses Blender files to distribute the StealC V2 information stealer.
– Malicious files target 3D model marketplaces like CGTrader.
– StealC V2 can steal data from browsers, cryptocurrency wallets, and various apps.
– The malware remains elusive to many antivirus programs, staying undetected on VirusTotal.
– Caution is advised for Blender users; disable ‘Auto Run Python Scripts’ for safety.
