Vidar Stealer Uses Memory Injection to Bypass Browsers and Steal Login Credentials
The update features a complete rewrite in C, advanced multi-threading, and enhanced credential theft efficiency that challenges browser-level encryption protections such as Chrome’s AppBound system.
Vidar 2.0’s transition from C++ to pure C represents a notable architectural overhaul aimed at maximizing stability and performance. The malware now leverages a multithreaded design, allowing it to exploit multi-core processors efficiently.
Each thread handles distinct data-collection tasks, from browser credentials to cryptocurrency wallets, dramatically reducing the time Vidar remains active on compromised systems.
This parallelized approach improves both exfiltration speed and evasion, as the malware minimizes observable system footprint and operational duration.
Vidar dynamically adjusts its thread count based on hardware specifications, allocating additional worker threads on robust systems while conserving resources on weaker ones.
The optimization ensures smooth performance on various targets while maintaining stealth against endpoint monitoring tools.
A crucial enhancement in Vidar 2.0 lies in its ability to bypass advanced browser encryption mechanisms. Developers claim the stealer uses “unique AppBound bypass methods” unavailable in public toolkits.
Binary analysis confirms that Vidar directly injects code into active browser processes, including Chrome, Edge, and Firefox, to extract decryption keys from live memory rather than from encrypted local storage.
By retrieving keys through reflective DLL or shellcode injection and transmitting them via named pipes, the malware sidesteps Chrome’s AppBound encryption that binds credentials to specific applications.
This method allows Vidar to steal not only browser-stored passwords but also tokens and session data for cloud services, gaming platforms, and communication apps like Discord and Telegram.
Its file grabber searches user directories for crypto wallet files such as 0.indexeddb.leveldb and Monero, as well as authentication caches for AWS and Azure accounts.
Vidar’s polymorphic binary builder ensures that each compiled sample carries distinct signatures through control-flow flattening and embedded numeric state machines, hindering static detection and reverse engineering.
Trend Micro’s Trend Vision One
As Lumma Stealer’s market influence fades, Vidar 2.0’s technical leap and $300 licensing model have positioned it as the next major infostealer of 2025, one that combines speed, stealth, and precision theft across the modern web.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Vidar Stealer Uses Memory Injection to Bypass Browsers and Steal Login Credentials appeared first on Cyber Security News.
Hi, Swifties. We don’t tend to have a lot in the way of Taylor Swift…
Cybersecurity giant Trellix has disclosed a significant security incident involving unauthorized access to a portion…
A sophisticated adversarial campaign targeting South-East Asian government and military infrastructure, combining rapid exploitation of…
Cynthia Whitaker sat alone on a bench at center stage, her face bathed in a…
Brilliant Minds and Stumble have both been canceled at NBC. Entertainment Weekly reported that the…
We noted this last month, but we really mean it in May: Things are starting…
This website uses cookies.