A stealer hiding in Blender 3D models | Kaspersky official blog
Researchers have uncovered a campaign where free 3D models for Blender with embedded Python scripts are being used to distribute the StealC V2 infostealer.
AI Analysis
Technical Summary
Researchers have identified a malicious campaign distributing the StealC V2 infostealer through free Blender 3D model files containing embedded Python scripts. Blender, a widely used open-source 3D graphics and animation suite, supports Python scripting to automate tasks and extend functionality. Attackers exploit this feature by uploading .blend files with malicious scripts to popular 3D model marketplaces such as CGTrader. When users download and open these files with Blender’s Auto Run Python Scripts feature enabled, the embedded script executes automatically without user interaction. The script connects to a remote server hosted on Cloudflare Workers, downloads a malware loader, and executes a PowerShell script that fetches additional payloads. The final payload, StealC V2, is an infostealer capable of extracting data from over 23 browsers, more than 100 browser extensions, 15 cryptocurrency wallet applications, and communication tools including Telegram, Discord, and ProtonVPN. It also bypasses User Account Control (UAC) to escalate privileges. This attack vector leverages legitimate software features rather than exploiting software vulnerabilities, making it difficult to detect and prevent without proper configuration and awareness. The campaign underscores the risks posed by unvetted third-party content and the lack of security oversight in departments using specialized tools like Blender. The threat is particularly concerning for organizations relying on open-source software and external content marketplaces, as it can lead to significant data breaches and espionage.
Potential Impact
For European organizations, especially those in creative industries, media production, architecture, and visualization sectors that commonly use Blender, this threat poses a significant risk of data theft and operational compromise. The StealC infostealer’s ability to harvest credentials, browser data, crypto wallets, and communications can lead to intellectual property theft, financial fraud, and exposure of sensitive corporate information. The attack can also facilitate lateral movement within networks if attackers leverage stolen credentials. Since the infection vector is embedded in freely available 3D models, employees downloading unvetted content can inadvertently compromise corporate devices. This risk is exacerbated in organizations without strict software usage policies or security awareness training. The stealthy nature of the attack, leveraging legitimate automation features, complicates detection and response. Additionally, the use of cloud-based infrastructure for payload delivery can bypass traditional network defenses. Overall, the threat can result in confidentiality breaches, loss of trust, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
European organizations should immediately disable Blender’s Auto Run Python Scripts feature to prevent automatic execution of embedded scripts. Security teams must implement strict policies prohibiting the use of unapproved third-party tools and content, including 3D models from untrusted sources. Conduct thorough risk assessments before adopting new software or content platforms. Deploy endpoint detection and response (EDR) solutions capable of monitoring script execution and PowerShell activity to detect suspicious behaviors. Regularly train employees on the risks of downloading and opening files from external marketplaces, emphasizing the dangers of automation features. Enforce application whitelisting and restrict PowerShell execution policies to limit malware execution. Integrate sandboxing or file scanning solutions that can analyze 3D model files and embedded scripts before use. Maintain up-to-date threat intelligence feeds to monitor emerging campaigns targeting creative software. Finally, ensure multi-factor authentication and network segmentation to limit damage from credential theft.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
A stealer hiding in Blender 3D models | Kaspersky official blog
Description
Researchers have uncovered a campaign where free 3D models for Blender with embedded Python scripts are being used to distribute the StealC V2 infostealer.
AI-Powered Analysis
Technical Analysis
Researchers have identified a malicious campaign distributing the StealC V2 infostealer through free Blender 3D model files containing embedded Python scripts. Blender, a widely used open-source 3D graphics and animation suite, supports Python scripting to automate tasks and extend functionality. Attackers exploit this feature by uploading .blend files with malicious scripts to popular 3D model marketplaces such as CGTrader. When users download and open these files with Blender’s Auto Run Python Scripts feature enabled, the embedded script executes automatically without user interaction. The script connects to a remote server hosted on Cloudflare Workers, downloads a malware loader, and executes a PowerShell script that fetches additional payloads. The final payload, StealC V2, is an infostealer capable of extracting data from over 23 browsers, more than 100 browser extensions, 15 cryptocurrency wallet applications, and communication tools including Telegram, Discord, and ProtonVPN. It also bypasses User Account Control (UAC) to escalate privileges. This attack vector leverages legitimate software features rather than exploiting software vulnerabilities, making it difficult to detect and prevent without proper configuration and awareness. The campaign underscores the risks posed by unvetted third-party content and the lack of security oversight in departments using specialized tools like Blender. The threat is particularly concerning for organizations relying on open-source software and external content marketplaces, as it can lead to significant data breaches and espionage.
Potential Impact
For European organizations, especially those in creative industries, media production, architecture, and visualization sectors that commonly use Blender, this threat poses a significant risk of data theft and operational compromise. The StealC infostealer’s ability to harvest credentials, browser data, crypto wallets, and communications can lead to intellectual property theft, financial fraud, and exposure of sensitive corporate information. The attack can also facilitate lateral movement within networks if attackers leverage stolen credentials. Since the infection vector is embedded in freely available 3D models, employees downloading unvetted content can inadvertently compromise corporate devices. This risk is exacerbated in organizations without strict software usage policies or security awareness training. The stealthy nature of the attack, leveraging legitimate automation features, complicates detection and response. Additionally, the use of cloud-based infrastructure for payload delivery can bypass traditional network defenses. Overall, the threat can result in confidentiality breaches, loss of trust, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
European organizations should immediately disable Blender’s Auto Run Python Scripts feature to prevent automatic execution of embedded scripts. Security teams must implement strict policies prohibiting the use of unapproved third-party tools and content, including 3D models from untrusted sources. Conduct thorough risk assessments before adopting new software or content platforms. Deploy endpoint detection and response (EDR) solutions capable of monitoring script execution and PowerShell activity to detect suspicious behaviors. Regularly train employees on the risks of downloading and opening files from external marketplaces, emphasizing the dangers of automation features. Enforce application whitelisting and restrict PowerShell execution policies to limit malware execution. Integrate sandboxing or file scanning solutions that can analyze 3D model files and embedded scripts before use. Maintain up-to-date threat intelligence feeds to monitor emerging campaigns targeting creative software. Finally, ensure multi-factor authentication and network segmentation to limit damage from credential theft.
Affected Countries
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/malicious-blender-model-files/54948/","fetched":true,"fetchedAt":"2025-12-10T18:06:24.764Z","wordCount":1025}
Threat ID: 6939b6a0fe7b3954b6891b08
Added to database: 12/10/2025, 6:06:24 PM
Last enriched: 1/3/2026, 12:21:41 AM
Last updated: 2/7/2026, 1:02:07 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.