Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Vidar Stealer Campaign Evades EDR to Stealthy Bypass
May 12, 2026
Home/Threats/Vidar Stealer Campaign Evades EDR to Stealthy Bypass
Threats

Vidar Stealer Campaign Evades EDR to Stealthy Bypass

A new, highly stealthy campaign distributing Vidar Stealer is actively targeting Windows users, employing a sophisticated attack chain engineered to evade Endpoint Detection and Response (EDR)...

Sarah simpson
Sarah simpson
May 12, 2026 4 Min Read
1 0

A new, highly stealthy campaign distributing Vidar Stealer is actively targeting Windows users, employing a sophisticated attack chain engineered to evade Endpoint Detection and Response (EDR) solutions and harvest sensitive credentials.

The campaign has drawn significant attention from the cybersecurity community because of how quietly it operates, often completing its theft before the victim ever realizes anything is wrong.

Vidar Stealer is a well-known information-stealing malware that first appeared in 2018 as a derivative of the Arkei stealer. Over the years, it has evolved into a powerful tool capable of extracting browser passwords, session cookies, cryptocurrency wallet data, authentication tokens, and autofill information stored locally on infected machines.

The latest campaign takes that capability further by incorporating advanced evasion mechanisms that allow it to bypass modern Endpoint Detection and Response tools with notable consistency.

Security researchers at Genians Security Center identified the campaign and noted that it relies on multi-stage delivery techniques, obfuscated script execution, and the abuse of legitimate system tools to avoid raising alarms.

Attack Flow of Police Official Impersonation Case (Source - Genians)
Attack Flow of Police Official Impersonation Case (Source – Genians)

The campaign’s ability to blend into normal system activity makes it particularly dangerous for organizations that rely on traditional signature-based detection methods alone.

Initial access is achieved through spear-phishing emails carefully tailored to match the recipient’s professional context and interests.

These messages carry ZIP-compressed attachments containing Windows shortcut files disguised as legitimate work documents. When a target opens the attachment and runs the shortcut file, an obfuscated command is quietly triggered in the background without showing any visible signs to the user.

EDR Bypass Through Layered Obfuscation

The malware then begins a chain of secondary payload downloads, eventually deploying its core information-stealing component onto the compromised system. Since each stage uses environment variable-based obfuscation to reconstruct commands only at runtime, static analysis tools often fail to identify the malicious intent until it is far too late for the victim to respond.

Deobfuscated Batch File Commands (Source - Genians)
Deobfuscated Batch File Commands (Source – Genians)

One of the most notable aspects of this campaign is how it avoids triggering behavior-based detection systems. The threat actor uses environment variable-based substring expansion to split and reassemble commands character by character, so the full command string never appears in plaintext during execution. This technique forces security tools to evaluate each fragment individually rather than recognizing the full malicious intent behind the instruction.

The attack also abuses curl.exe, a native Windows binary, to download additional payloads from remote servers. Using built-in operating system tools in this way is a tactic known as Living-off-the-Land, which is harder to flag because the tools themselves are legitimate system components. A Python Embed package is retrieved from a trusted external source to create a silent execution environment, reducing the suspicion tied to outbound network activity throughout the infection process.

A scheduled task is then created under a name crafted to resemble a legitimate Microsoft system process, ensuring the malware persists across reboots and continues running at one-minute intervals. The final payload, a compiled Python bytecode file disguised with a .cat extension, functions as a remote access backdoor capable of executing commands, collecting files, and exfiltrating system data to attacker-controlled infrastructure.

Credential Theft and Its Broader Impact

Vidar’s core function in this campaign is extracting user credentials and other sensitive data stored within Chromium-based browsers and similar applications. It targets locally stored passwords, session cookies, and the encrypted key files that browsers use to protect login data from unauthorized access. The malware uses the Windows CryptUnprotectData API to decrypt these keys directly from the browser’s Local State file, granting it full access to saved credentials.

Comparison of Similarities in XOR String Obfuscation (Source - Genians)
Comparison of Similarities in XOR String Obfuscation (Source – Genians)

Multiple command-and-control domains were identified during the investigation, spread across different countries and hosting providers, making infrastructure-based blocking considerably more difficult for defenders. The campaign’s reach across various sectors highlights just how broadly these credential theft tools are being deployed.

Organizations are advised to strengthen behavior-based EDR capabilities to detect obfuscated script execution and multi-stage download activity. Blocking shortcut file execution from within archives, auditing scheduled tasks regularly, and avoiding saving credentials directly in browsers are concrete steps that can meaningfully reduce exposure to this growing threat.

Indicators of Compromise (IoCs):-

Type Indicator Description
Domain kmot.co[.]kr Korea-based C2 server hosting malicious payloads
Domain haeundaejugong[.]com C2 server used to collect and exfiltrate user data
Domain kumdo[.]org Secondary C2 server for data exfiltration
Domain nls5950.cafe24[.]com C2 infrastructure used in related malicious activity
Domain hanainternational[.]net C2 domain linked to threat actor infrastructure
Domain mlgpf.ir114[.]net C2 domain associated with campaign
Domain luminix[.]kr C2 domain identified in related malicious files
Domain sunlin[.]org C2 domain observed in threat actor infrastructure
Domain ezvm[.]kr C2 domain linked to malicious distribution
Domain intobiz[.]kr C2 domain used in campaign infrastructure
Domain choisy[.]fr France-based C2 server observed in attack chain
Domain printory[.]kr Domain used to host compiled Python bytecode malware
Domain udcontest[.]com Domain hosting webshell used in phishing attack
Domain ableinfo.co[.]kr Distribution infrastructure for malicious files
IP Address 114.207.246[.]156 IP address shared across multiple attack domains
File Name settingenv.cat Compiled Python bytecode payload disguised as Windows catalog file
File Name codeflush.exe Renamed pythonw.exe used as stealthy malware execution host
File Name GX)/M27s.bat Obfuscated batch file used for secondary payload execution
File Name ms3360.bat Batch file variant used in obfuscated execution chain
File Name yS1825.bat Batch file variant identified in attack chain
File Name K3772.bat Batch file variant used in environment variable obfuscation
File Name HqcUpdate.exe Final information-stealing payload (Chinotto)
File Name WStep163.cab Obfuscated Python script downloaded from C2 server
File Name MicroAppsTemp28h2.bat Batch file downloaded from C2 for follow-up activity
Scheduled Task MicrosoftMusicLibrariesPackageTaskMachine Persistence mechanism disguised as legitimate Microsoft task

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Threat Actors Exploit Vercel AI Tools for Leverage Vercel’s

Next Post

Zoom Rooms Vulnerabilities Allow Attackers to Escalate

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us