Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Vidar Malware Steals Corporate Credentials via Fake YouTube Downloads
Threats

Vidar Malware Steals Corporate Credentials via Fake YouTube Downloads

Vidar, a credential-stealing malware, has rapidly become one of the most active threats targeting corporate employees in early 2026. Threat actors are using fake software downloads promoted through...

David kimber
David kimber
April 27, 2026 4 Min Read
0 0

Vidar, a credential-stealing malware, has rapidly become one of the most active threats targeting corporate employees in early 2026.

Threat actors are using fake software downloads promoted through YouTube videos to trick workers into installing it on their machines, resulting in widespread theft of login credentials, browser data, and cryptocurrency wallet information.

The campaign has caught the attention of security researchers worldwide due to its growing scale and targeted nature.

The rise of Vidar did not happen overnight. Throughout 2025, international law enforcement operations dismantled the infrastructure of two widely used infostealers, Lumma and Rhadamanthys.

As those platforms collapsed, cybercriminals quickly scrambled for a reliable alternative. Vidar’s operators saw the opportunity and released Vidar version 2.0 in October 2025, introducing stronger capabilities and improved evasion techniques.

Since then, Vidar has consistently ranked as the top stealer on the Russian Market, based on the volume of stolen logs uploaded each month.

Intrinsec analysts identified a complete kill-chain while investigating a Vidar compromise that affected a corporate employee at one of their client organizations.

Their analysis showed that the attack started with a YouTube video advertising a fake software tool called NeoHub.

The victim found a link to the file, was redirected through a file-sharing site, and ended up downloading a malicious archive from Mediafire.

Websites Visited Before Downloading the Malicious Archive (Source - Intrinsec)
Websites Visited Before Downloading the Malicious Archive (Source – Intrinsec)

The entire process looked like a normal software installation. The impact extends well beyond one compromised employee. Vidar has been adopted by a wide range of threat actors, from individual opportunists to organized groups like Scattered Spider.

CISA published a security advisory naming Vidar among the tools used by that group. Stolen credentials are then sold on Russian Market, putting corporate networks and internal accounts at serious risk.

Targeting Web Browsers (Source - Intrinsec)
Targeting Web Browsers (Source – Intrinsec)

The malware targets Chrome, Firefox, Edge, Opera, Vivaldi, Waterfox, and Palemoon, collecting passwords, cookies, credit card data, and cryptocurrency wallet files.

The Infection Mechanism: A Carefully Staged Attack

The kill-chain behind this campaign is built to avoid suspicion from start to finish. After the victim downloads the archive from Mediafire, they are presented with what appears to be a standard software package.

Malicious Archive Found on Mediafire (Source - Intrinsec)
Malicious Archive Found on Mediafire (Source – Intrinsec)

The most visible file is NeoHub.exe, which looks like a normal installer. In reality, this executable secretly loads a second file named msedge_elf.dll, which carries the actual Vidar payload.

Imports of the Malicious EXE (Source - Intrinsec)
Imports of the Malicious EXE (Source – Intrinsec)

Together, both files work in sync to quietly launch the infection. The msedge_elf.dll file was built to mimic a genuine Microsoft Edge browser component, making it harder to spot during a quick review.

To add another layer of believability, the file was signed using a fake code-signing certificate. The first version impersonated GitHub under the name “githab.com”, and a later version impersonated grow.com.

Fake Certificate (Source - Intrinsec)
Fake Certificate (Source – Intrinsec)

Both certificates were tied to multiple other malicious files, pointing to either a shared threat actor or a third-party service generating counterfeit signatures.

The malicious DLL is packed using a GO-based packer with unusual section names and control flow flattening. This method deliberately breaks the code’s natural structure, making it very hard for security tools and analysts to examine.

Once running on the victim’s machine, Vidar uses a Dead Drop Resolver to locate its command-and-control server. Rather than hardcoding a C2 address, the malware hides the real server location inside public Steam profiles and Telegram channels, giving attackers the ability to rotate infrastructure quickly without updating the malware itself.

Organizations should train employees to avoid downloading software through YouTube video links or unknown file-sharing websites. Multi-factor authentication (MFA) should be enabled on all browser-linked accounts to lower the risk of credential theft.

Security teams are advised to block malicious domains and IP addresses using published indicators of compromise, and set up network monitoring to catch unusual outbound connections to unknown C2 servers.

Secure Web Gateways and DNS filtering can stop malicious redirections before they reach users. Sandboxing downloaded files before execution adds a critical layer of defense.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

EU Proposes Google Share User Search Data with Rivals

Next Post

New Malware Evades Detection via Obfuscation & St Uses Staged

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us