Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Home/Threats/Hackers Use Fake Reddit Posts to Deliver Vidar & TradingView Premium
Threats

Hackers Use Fake Reddit Posts to Deliver Vidar & TradingView Premium

A threat actor is actively exploiting Reddit, deploying fake posts that lure users with promises of free TradingView Premium access. This campaign delivers two distinct malware families: Vidar,...

Jennifer sherman
Jennifer sherman
April 7, 2026 4 Min Read
5 0

A threat actor is actively exploiting Reddit, deploying fake posts that lure users with promises of free TradingView Premium access. This campaign delivers two distinct malware families: Vidar, targeting Windows systems, and AMOS, designed for macOS. The operation remains live; as older posts are removed, new ones quickly emerge to continue distributing these information stealers, as detailed in a recent report

TradingView is one of the most widely used charting platforms among retail traders, crypto investors, and forex enthusiasts. Its Premium subscription unlocks advanced indicators and real-time market data at a price many users would rather skip.

The threat actor exploits that gap by posting across multiple subreddits — some hijacked, others purpose-built — with step-by-step instructions that walk victims through the full infection chain without raising suspicion.

Hexastrike analysts traced these infections back to Reddit while handling several recent stealer cases.

They identified a single threat actor operating across at least five subreddits, using aged, purchased, or compromised accounts to appear credible.

What stands out is not technical complexity but operational discipline — hosting domains get swapped the moment they are flagged, warning comments from real users are deleted within minutes, and the posts appear LLM-generated to keep a consistent tone.

The subreddits tell a clear story. r/BitBullito and r/CryptoCurrencyDM had just two and 29 subscribers respectively, while the accounts posting in them were three to six years old — lending false legitimacy to the operation.

One account, u/BroadDepartment573, carried a Four Year Club Reddit trophy but had only a single post across its entire history.

Reddit profile of u - BroadDepartment573 showing the Four Year Club trophy alongside an otherwise empty activity history (Source - Hexastrike)
Reddit profile of u – BroadDepartment573 showing the Four Year Club trophy alongside an otherwise empty activity history (Source – Hexastrike)

Every post follows the same template, claiming the software was reverse engineered with all license checks removed.

Post body claiming the software is reverse engineered with all license checks removed and premium access unlocked forever (Source - Hexastrike)
Post body claiming the software is reverse engineered with all license checks removed and premium access unlocked forever (Source – Hexastrike)

Separate download links are offered for Windows, macOS, and macOS 15 — a level of platform targeting that shows the actor understands Apple’s Gatekeeper restrictions in macOS Sequoia.

The Infection Mechanism

Payloads are hosted on compromised legitimate business websites, lending added credibility to the download links.

On Windows, the extracted executable is bloated to over 784 megabytes through null-byte padding in its PE resource section, deliberately sized to exceed antivirus scan limits.

Entropy graph of the executable showing the resource section filled almost entirely with zero-byte padding (Source - Hexastrike)
Entropy graph of the executable showing the resource section filled almost entirely with zero-byte padding (Source – Hexastrike)

Beneath the padding sits a 44-kilobyte self-extracting cabinet that drops a batch script named Receipt.gif.

Despite the image extension, it is a 235-line obfuscated script that reassembles a Vidar infostealer from split file fragments using character substitution to defeat signature-based detection.

First lines of Receipt.gif showing the Set variable chain with random dictionary words inserted as obfuscation padding (Source - Hexastrike)
First lines of Receipt.gif showing the Set variable chain with random dictionary words inserted as obfuscation padding (Source – Hexastrike)

The archive password — either “github” or “codeberg” — is posted directly in the Reddit thread, both names chosen to evoke legitimate developer platforms and lower suspicion.

On macOS, the download is a disk image that mounts with a TradingView-branded background to mimic a real installer. Inside sits a compact 217-kilobyte Mach-O binary that decrypts an AMOS stealer at runtime through a polymorphic XOR loop.

Once executed, AMOS harvests credentials and cookies from Chrome, Firefox, Safari, Brave, Edge, and Opera, copies wallet files from Exodus, Electrum, and MetaMask, and exfiltrates everything over HTTP within seconds.

Mounted TradingView DMG showing the application icon over a branded background designed to appear like a legitimate installer (Source - Hexastrike)
Mounted TradingView DMG showing the application icon over a branded background designed to appear like a legitimate installer (Source – Hexastrike)

Organizations should add the identified distribution domains to web proxy and DNS blocklists, and hunt for patterns where Reddit browsing is followed quickly by a large ZIP download from an unrelated domain.

On Windows, flag wextract.exe spawning cmd.exe with delayed variable expansion. On macOS, monitor for unsigned applications calling osascript or making unexpected dscl authonly credential validation attempts.

Anyone with any doubt about exposure should treat it as a confirmed compromise — browser passwords, session cookies, and crypto wallet keys should all be considered stolen. Downloading cracked software remains one of the most reliable ways threat actors find victims today.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

ExploitHackerMalwareThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Windows Defender 0-Day Exploit Gives Attackers Full

Next Post

OpenAI Codex Command Injection Steals GitHub Access

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Infostealer Uses GitHub Releases for Payload Hosting & Evasion
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us