Cybersecurity researchers have warned of a refined Vidar malware campaign targeting browser passwords, session cookies, crypto wallets and system data through a multi-stage infection chain.

Browser Passwords, Crypto Wallets And Cookies Under Threat In Vidar Malware Attack

The420.in Staff
5 Min Read

A long-running and increasingly sophisticated malware campaign involving the Vidar information stealer has once again drawn attention from cybersecurity researchers. Active since 2018, Vidar malware is now being observed in a refined attack structure designed to bypass modern endpoint protection systems while stealing highly sensitive user and organizational data.

Security researchers report that the malware is no longer limited to basic password theft. Instead, it now targets browser-stored credentials, session cookies, cryptocurrency wallet files, and detailed system information that can be exploited for financial fraud or unauthorized access to digital infrastructure.

Registration Begins for FutureCrime Summit 2026, India’s Largest Cybercrime Conference

Originally developed using the source code of an earlier stealer known as Arkei, Vidar has evolved into a widely circulated commodity malware family. Its recent campaigns show a clear shift toward multi-stage infection chains, making detection significantly more difficult for traditional antivirus and security tools.

Disguised Software Tool Starts Infection Chain

According to threat intelligence findings shared by cybersecurity analysts at LevelBlue, the latest Vidar campaign uses a carefully structured infection process. The attack typically begins with a seemingly legitimate software activation tool such as “MicrosoftToolkit.exe,” which misleads users into executing the malware manually.

Once launched, the initial file triggers a sequence of hidden scripts. A disguised file is renamed and executed as a batch process, followed by additional payload extraction stages. Security telemetry shows that the malware checks for active security processes, attempts to disable monitoring tools, and then executes a loader compiled using AutoIt scripting techniques.

Researchers observed that this layered approach allows attackers to evade endpoint detection systems and maintain persistence long enough to extract sensitive data before any defensive response can be triggered.

Passwords, Cookies and Crypto Wallets Targeted

Vidar’s primary objective remains data exfiltration. Once fully deployed, it scans infected systems for stored browser credentials, authentication cookies, saved passwords, and cryptocurrency wallet files. Even a single compromised device can provide attackers with access to multiple online accounts, financial platforms, and enterprise systems.

Cybersecurity analysts warn that stolen session cookies are particularly dangerous because they can allow attackers to bypass login authentication entirely, including multi-factor authentication in some cases, if sessions remain active.

The malware has also been observed communicating with external infrastructure disguised as legitimate traffic. Command-and-control operations reportedly use platforms such as Telegram and Steam to blend malicious activity with normal web traffic, making detection more complex.

Self-Cleaning Malware Complicates Forensics

One of the most concerning aspects of the Vidar campaign is its ability to erase evidence after execution. Once data exfiltration is complete, the malware deletes dropped files, clears execution traces, resets file attributes, and terminates its own processes.

It also checks for debugging and analysis environments before execution. If security monitoring tools are detected, the malware may alter or delay its behavior, further complicating forensic investigation.

Additionally, DNS queries associated with suspicious domains and dynamically changing infrastructure indicate that attackers are relying on rotating command servers to avoid blocklisting.

Cybersecurity experts recommend immediate isolation of any potentially infected systems, followed by full system reimaging. Because Vidar can download additional payloads, partial cleanup is considered insufficient in most cases.

Organizations are advised to reset all credentials, including email, VPN, banking, and administrative accounts, and terminate active sessions across services. Enforcing multi-factor authentication and restricting execution of unauthorized software tools are also critical defensive steps.

Monitoring outbound network traffic, DNS requests, and unusual HTTP connections is recommended to identify early indicators of compromise. Security teams are also advised to maintain updated threat intelligence feeds to track evolving Vidar infrastructure.

Cybersecurity specialists note that modern information stealers like Vidar represent a growing shift in cybercrime tactics. Instead of relying on direct system exploitation, attackers increasingly use social engineering combined with stealthy loaders and legitimate platform abuse.

Stay Connected