Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

A stealer hiding in Blender 3D models | Kaspersky official blog

0
Medium
Vulnerabilitypython
Published: Wed Dec 10 2025 (12/10/2025, 17:58:20 UTC)
Source: Kaspersky Security Blog

Description

Researchers have uncovered a campaign where free 3D models for Blender with embedded Python scripts are being used to distribute the StealC V2 infostealer.

AI-Powered Analysis

AILast updated: 01/03/2026, 00:21:41 UTC

Technical Analysis

Researchers have identified a malicious campaign distributing the StealC V2 infostealer through free Blender 3D model files containing embedded Python scripts. Blender, a widely used open-source 3D graphics and animation suite, supports Python scripting to automate tasks and extend functionality. Attackers exploit this feature by uploading .blend files with malicious scripts to popular 3D model marketplaces such as CGTrader. When users download and open these files with Blender’s Auto Run Python Scripts feature enabled, the embedded script executes automatically without user interaction. The script connects to a remote server hosted on Cloudflare Workers, downloads a malware loader, and executes a PowerShell script that fetches additional payloads. The final payload, StealC V2, is an infostealer capable of extracting data from over 23 browsers, more than 100 browser extensions, 15 cryptocurrency wallet applications, and communication tools including Telegram, Discord, and ProtonVPN. It also bypasses User Account Control (UAC) to escalate privileges. This attack vector leverages legitimate software features rather than exploiting software vulnerabilities, making it difficult to detect and prevent without proper configuration and awareness. The campaign underscores the risks posed by unvetted third-party content and the lack of security oversight in departments using specialized tools like Blender. The threat is particularly concerning for organizations relying on open-source software and external content marketplaces, as it can lead to significant data breaches and espionage.

Potential Impact

For European organizations, especially those in creative industries, media production, architecture, and visualization sectors that commonly use Blender, this threat poses a significant risk of data theft and operational compromise. The StealC infostealer’s ability to harvest credentials, browser data, crypto wallets, and communications can lead to intellectual property theft, financial fraud, and exposure of sensitive corporate information. The attack can also facilitate lateral movement within networks if attackers leverage stolen credentials. Since the infection vector is embedded in freely available 3D models, employees downloading unvetted content can inadvertently compromise corporate devices. This risk is exacerbated in organizations without strict software usage policies or security awareness training. The stealthy nature of the attack, leveraging legitimate automation features, complicates detection and response. Additionally, the use of cloud-based infrastructure for payload delivery can bypass traditional network defenses. Overall, the threat can result in confidentiality breaches, loss of trust, regulatory penalties under GDPR, and financial losses.

Mitigation Recommendations

European organizations should immediately disable Blender’s Auto Run Python Scripts feature to prevent automatic execution of embedded scripts. Security teams must implement strict policies prohibiting the use of unapproved third-party tools and content, including 3D models from untrusted sources. Conduct thorough risk assessments before adopting new software or content platforms. Deploy endpoint detection and response (EDR) solutions capable of monitoring script execution and PowerShell activity to detect suspicious behaviors. Regularly train employees on the risks of downloading and opening files from external marketplaces, emphasizing the dangers of automation features. Enforce application whitelisting and restrict PowerShell execution policies to limit malware execution. Integrate sandboxing or file scanning solutions that can analyze 3D model files and embedded scripts before use. Maintain up-to-date threat intelligence feeds to monitor emerging campaigns targeting creative software. Finally, ensure multi-factor authentication and network segmentation to limit damage from credential theft.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/malicious-blender-model-files/54948/","fetched":true,"fetchedAt":"2025-12-10T18:06:24.764Z","wordCount":1025}

Threat ID: 6939b6a0fe7b3954b6891b08

Added to database: 12/10/2025, 6:06:24 PM

Last enriched: 1/3/2026, 12:21:41 AM

Last updated: 2/7/2026, 1:02:07 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats