Security
Blender Model Files: The Gateway to StealC Infostealing Malware
Malicious Blender Files Delivering StealC Infostealing Malware
A recent cybersecurity discovery has revealed that a Russian-linked campaign is distributing the StealC V2 information stealer malware through deceptive Blender files that are being uploaded to popular 3D model marketplaces like CGTrader.
Blender, an open-source 3D creation suite, is a versatile tool capable of executing Python scripts for various functionalities such as automation, custom user interfaces, rendering processes, rigging tools, and pipeline integration.
One concerning aspect is the Auto Run feature within Blender, which, when enabled, can automatically execute Python scripts upon opening specific files. This convenience feature, however, has been exploited by malicious actors in this campaign.
Despite the risks involved, users often opt to enable the Auto Run feature for its convenience, unknowingly exposing themselves to potential threats.
Researchers at Morphisec, a cybersecurity company, have identified attacks utilizing malicious .blend files embedded with Python code that fetches a malware loader from a Cloudflare Workers domain.

Source: Morphisec
The loader, in turn, retrieves a PowerShell script that downloads two ZIP archives, ZalypaGyliveraV1 and BLENDERX, from controlled IPs by the attackers. These archives unpack in the %TEMP% folder and drop LNK files in the Startup directory for persistence, deploying the StealC infostealer alongside an auxiliary Python stealer for added redundancy.

Source: Morphisec
The latest variant of the StealC malware employed in this campaign has enhanced data-stealing capabilities, including support for extracting information from various sources such as browsers, cryptocurrency wallets, messaging platforms, VPN clients, and mail clients.
Despite being documented since 2023, the StealC variant analyzed by Morphisec evades detection by most antivirus software, highlighting the need for heightened vigilance among users.
Given the limited ability of 3D model marketplaces to scrutinize user-submitted files for malicious content, Blender users are urged to exercise caution when downloading files from such platforms and consider disabling the auto-execution of code within Blender’s settings.
To disable auto-execution, users can navigate to Blender > Edit > Preferences and uncheck the ‘Auto Run Python Scripts’ option.
It is crucial for users to treat 3D assets as executable files and only trust content from reputable sources with a proven track record. Additionally, utilizing sandboxed environments for testing purposes is recommended to mitigate potential risks.
As the Model Context Protocol (MCP) gains traction as the standard for connecting LLMs to tools and data, security teams are prioritizing the safeguarding of these new services.
Discover 7 best practices in this free cheat sheet to enhance your security measures today.
-
Facebook4 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook4 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook4 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook4 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook2 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook2 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook2 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple4 months agoMeta discontinues Messenger apps for Windows and macOS

