Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

Vidar Stealer 2.0 Distributed via Fake Game Cheats on GitHub and Reddit

Amber | Attack Report
Download PDF

Summary

Threat actors are actively distributing Vidar Stealer 2.0 malware through a sophisticated social engineering campaign targeting gamers seeking free cheating software. The Vidar Stealer 2.0 malware campaign leverages hundreds of fake game cheat repositories hosted on GitHub and promoted via Reddit posts, targeting popular online games including Counter-Strike 2, Fortnite, Valorant, and Call of Duty. First observed in October 2025, this global Vidar Stealer 2.0 attack has compromised Windows systems across the gaming industry.

The Vidar Stealer 2.0 malware operates through PowerShell-based loaders compiled into .NET binaries, deploying a Themida-packed infostealer that systematically exfiltrates sensitive data. Vidar Stealer 2.0 targets browser credentials, cookies, autofill data, Azure tokens, cryptocurrency wallets, FTP/SSH credentials, and messaging app session data. The Vidar Stealer 2.0 infrastructure conceals command-and-control servers behind Telegram bots and Steam profiles used as dead drop resolvers, making detection and attribution challenging for security teams.


Attack Details

Initial Compromise Through Social Engineering

The Vidar Stealer 2.0 campaign begins with threat actors targeting gamers seeking free cheat tools for popular online games. Vidar Stealer 2.0 attackers seed malicious links across Reddit threads and Discord servers dedicated to Counter-Strike 2, Fortnite, Valorant, and Call of Duty gaming communities. These Vidar Stealer 2.0 distribution posts promise high-performance game cheats but redirect unsuspecting victims to fake GitHub repositories and polished GitHub Pages designed to mimic legitimate software distribution hubs. By exploiting trust in well-known platforms like GitHub and Reddit, Vidar Stealer 2.0 operators successfully lower victim suspicion and increase malware download rates.

Deceptive Installation Process

Once victims land on malicious Vidar Stealer 2.0 distribution pages, they encounter a professional-looking installation process deliberately designed to feel familiar to gamers. The Vidar Stealer 2.0 installation instructions specifically request users to disable antivirus protections, extract password-protected archives, and execute files with administrative privileges. Because legitimate cheat tools often require deep system access, these Vidar Stealer 2.0 security bypass requests don’t immediately raise red flags among the gaming community. The Vidar Stealer 2.0 payloads are cleverly disguised in nested or encrypted archives with gaming-themed filenames, helping them evade automated detection systems and casual security scrutiny.

Sophisticated Execution Chain

Behind the scenes, the Vidar Stealer 2.0 execution chain demonstrates significant technical sophistication. The initial Vidar Stealer 2.0 payload typically consists of a PowerShell-based loader compiled into a .NET binary using PS2EXE, allowing it to masquerade as a standard executable. Once launched, Vidar Stealer 2.0 immediately weakens system defenses by adding exclusions to Windows Defender, then reaches out to attacker-controlled infrastructure via Pastebin to fetch secondary payloads hosted on GitHub. The Vidar Stealer 2.0 loader establishes a hidden foothold in the %AppData% directory, drops additional malicious components, and ensures persistence through scheduled tasks triggering at user logon. Advanced Vidar Stealer 2.0 variants employ heavily obfuscated scripts and multi-stage extraction chains to reconstruct the final malware payload in memory, significantly complicating detection efforts.

Advanced Vidar Stealer 2.0 Capabilities

The final Vidar Stealer 2.0 payload represents a complete rewrite from C++ to C, featuring heavy obfuscation and continuous evolution. Vidar Stealer 2.0 employs polymorphic builds, anti-debugging checks, and virtual machine detection mechanisms to evade security analysis. The Vidar Stealer 2.0 command-and-control infrastructure is deliberately concealed, leveraging Telegram bots and Steam profiles as indirect channels to resolve real server addresses. Once active, Vidar Stealer 2.0 systematically harvests sensitive data including browser credentials, cookies, cryptocurrency wallets, messaging app sessions, gaming platform logins, along with files and screenshots from infected systems.

Data Exfiltration and Campaign Effectiveness

All data collected by Vidar Stealer 2.0 is staged locally before being exfiltrated to remote attacker-controlled servers, completing a highly efficient data theft cycle. What makes this Vidar Stealer 2.0 campaign particularly effective is its alignment with gamer behavior patterns, exploiting both the demand for game cheats and the normalization of risky security actions within the gaming ecosystem. The Vidar Stealer 2.0 attackers aren’t simply delivering malware; they’re embedding it seamlessly into a workflow that gaming victims already trust and frequently engage with.


Recommendations

Deploy Behavioral Endpoint Detection

Implement modern endpoint protection or EDR solutions capable of behavioral and signature-based scanning to detect suspicious Vidar Stealer 2.0 process chains, credential access patterns, and data exfiltration behavior characteristic of infostealer infections.

Restrict Execution from Non-Standard Paths

Configure application control policies to block execution of Vidar Stealer 2.0 binaries from directories not typically used by legitimate software, including %AppData%, %ProgramData%, and %Temp% subdirectories with randomly generated names.

Monitor Scheduled Task Creation

Implement detection rules for the creation of scheduled tasks with suspicious names such as “SystemBackgroundUpdate” or tasks configured to run at logon with elevated privileges from non-standard executable paths commonly used by Vidar Stealer 2.0.

Audit Windows Defender Exclusion Modifications

Monitor for unauthorized additions to Windows Defender exclusion paths, particularly those targeting newly created directories in %AppData% or other user-writable locations, as the Vidar Stealer 2.0 loader disables scanning for its payload drop zone.

Enforce Software Download Policies

Educate users on the risks of downloading tools from unofficial sources, particularly game cheats, cracks, and key generators that frequently distribute Vidar Stealer 2.0. Enforce policies requiring software to be obtained only from verified vendors or trusted repositories.

Implement Browser Credential Protection

Deploy browser security solutions or enterprise browser configurations that mitigate Vidar Stealer 2.0 credential theft via Local State file decryption and browser debug port abuse. Consider disabling remote debugging flags in managed Chromium-based browser deployments.

Monitor for Pastebin and GitHub Payload Staging

Implement network monitoring rules to detect suspicious connections to Pastebin URLs followed by downloads from GitHub repositories, which is the staging pattern used by the Vidar Stealer 2.0 loader to retrieve its secondary payload.

Rotate Credentials After Suspected Compromise

If Vidar Stealer 2.0 infection is suspected, immediately rotate all browser-saved passwords, Azure CLI tokens, FTP/SSH credentials, Telegram and Discord sessions, cryptocurrency wallet keys, and any other credentials that may have been stored on the affected system.


Indicators of Compromise (IoCs)

SHA256 Hashes:

  • 2f416aac027f19f563cc45e3b4b72e992aaafb63da27f968b9a76a391134dc7d
  • b1cebd305c6aa27048a3673e70f8e1604735b2c06c83452d2935c330b5a3eb58
  • b6192c05029c8905fcbb88469d712dfdeaf1feb33b0690f8539373f19b6cbf85
  • fa7eafa65996c325faf2d77cc2d80179daa9228b3c138d2d3365280c79e30820
  • cbf2218ce316134795c75691f17dfaf02071ff5c369049fbf11ed072cf2103ab
  • c5e7fab18baee4a6b092e566414f4d2df1afbde35a1d12f518113054f144853f
  • 4a090e26e285661730dfd0911856c830bd0a44e639237178476ccb4993d7974f
  • e1979c42cb9e72ba9f9fcae7364887df1edcad38128feefdc3adbc768c51da05
  • d1721c9adcfa3d16bb4907afccfae64517e6c58a7c6ef058c9f5f543f60240c9
  • d1258b4c2b9849833651d1e844d1a99a5bc7febbb751548f960e92525afe6c26
  • bfee57d9e1b68c5c5aa63792b4e67b94f3361749e186531bd01609d9382672f3
  • 496d15810c25136955dd9aed6d018519380ee431f28c1bca715da59fe1385d12

Malicious URLs:

  • hxxps[:]//telegram[.]me/bul33bt
  • hxxps[:]//telegram[.]me/cego54
  • hxxps[:]//telegram[.]me/ahnadar
  • hxxps[:]//steamcommunity[.]com/profiles/76561198765046918
  • hxxps[:]//steamcommunity[.]com/profiles/76561198761022496
  • hxxps[:]//steamcommunity[.]com/profiles/76561198780411257

MITRE ATT&CK TTPs

Initial Access: T1566.003 – Spearphishing via Service

Execution: T1059.001 – PowerShell, T1059.005 – Visual Basic, T1059.003 – Windows Command Shell, T1204.002 – Malicious File

Persistence: T1053.005 – Scheduled Task, T1574.001 – DLL Hijack

Privilege Escalation: T1548 – Abuse Elevation Control Mechanism

Defense Evasion: T1562.001 – Disable or Modify Tools, T1027.002 – Software Packing, T1027.013 – Encrypted/Encoded File, T1497 – Virtualization/Sandbox Evasion, T1622 – Debugger Evasion, T1564.001 – Hidden Files and Directories, T1070.006 – Timestomp, T1036.005 – Match Legitimate Name or Location, T1102 – Web Service, T1055.001 – Dynamic-link Library Injection

Credential Access: T1555.003 – Credentials from Web Browsers, T1552.001 – Credentials In Files, T1539 – Steal Web Session Cookie

Collection: T1005 – Data from Local System, T1113 – Screen Capture, T1119 – Automated Collection

Command and Control: T1071.001 – Web Protocols, T1105 – Ingress Tool Transfer

Exfiltration: T1041 – Exfiltration Over C2 Channel


References

https://www.acronis.com/en/tru/posts/vidar-stealer-20-distributed-via-fake-game-cheats-on-github-and-reddit/

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox