A Russian-speaking threat actor is quietly weaponizing 3D model marketplaces, planting malicious Blender project files that deliver the ๐ฆ๐๐ฒ๐ฎ๐น๐ฐ ๐ฉ๐ฎ information-stealing malware to artists, freelancers, and studios. The operation relies on realistic-looking character rigs published on platforms such as CGTrader, then abuses Blenderโs ability to run embedded Python scripts to pivot from a creative workflow into a full credential theft compromise.ipelines, render farms, or asset repositories, this delivery vector gives attackers immediate access to environments that typically hold high-value accounts, source files, and in many cases, payment details. That shift turns a seemingly niche 3D content problem into a mainstream enterprise security issue.
๐๐น๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ฎ๐ ๐ฎ ๐บ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ ๐ฑ๐ฒ๐น๐ถ๐๐ฒ๐ฟ๐ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น
Blender supports rich automation through Python. Riggers and technical artists routinely embed scripts in .blend files to build custom user interfaces, automate rig controls, or drive complex animation systems. When the ๐๐๐๐ผ ๐ฅ๐๐ป ๐ฃ๐๐๐ต๐ผ๐ป ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐๐ option is enabled, those scripts execute automatically as soon as a project file is opened, without additional user interaction.
In a normal pipeline, that convenience saves time and allows advanced rigs to โjust workโ out of the box. In this campaign, the same feature becomes the initial execution vector. The adversary uploads character rigs that appear attractive and technically polished. As soon as a target opens the downloaded file with Auto Run enabled, the embedded Python code runs in the background and silently starts the infection chain.
๐๐ฟ๐ผ๐บ ๐๐ฟ๐๐๐๐ฒ๐ฑ ๐บ๐ผ๐ฑ๐ฒ๐น ๐ณ๐ถ๐น๐ฒ ๐๐ผ ๐ฎ ๐ฆ๐๐ฒ๐ฎ๐น๐ฐ ๐ฝ๐ฎ๐๐น๐ผ๐ฎ๐ฑ
The malicious Blender files embed Python that contacts attacker-controlled infrastructure hosted behind Cloudflare Workers. From there, the script downloads a loader component that orchestrates the next stages.
That loader retrieves two archives, named ๐ญ๐ฎ๐น๐๐ฝ๐ฎ๐๐๐น๐ถ๐๐ฒ๐ฟ๐ฎ๐ฉ๐ญ and ๐๐๐๐ก๐๐๐ฅ๐ซ, from IP addresses owned by the threat actor. After extraction into the Windows temporary directory, the malware creates shortcut files in the Startup folder, giving the attackers persistence across reboots without adding noisy new services or scheduled tasks. The same stage drops two data-theft components: the main ๐ฆ๐๐ฒ๐ฎ๐น๐ฐ ๐ถ๐ป๐ณ๐ผ๐๐๐ฒ๐ฎ๐น๐ฒ๐ฟ and an auxiliary Python-based stealer that likely exists as a fallback if the primary payload fails or gets blocked.
By the time the victim starts exploring the rig or moving the 3D model into a project, the system has already reached a post-compromise state. No exploit kit, no phishing page, just a โlegitimateโ asset file that behaves like an application.
๐ช๐ต๐ ๐๐ต๐ถ๐ ๐ฐ๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐ฑ๐ฟ๐ผ๐ฝ๐ ๐ฆ๐๐ฒ๐ฎ๐น๐ฐ ๐ฉ๐ฎ
Stealc emerged as a MaaS (Malware-as-a-Service) infostealer around 2023, positioned as a competitor and copycat of families such as Vidar, Raccoon, Mars, and RedLine. It gained traction quickly in Russian-language cybercrime forums due to its modular design, active development roadmap, and focus on credential and wallet theft.
The variant used in the Blender campaign tracks with the second major version of Stealc. Public reporting indicates that this branch extends support to more than twenty mainstream browsers, a long list of browser extensions, and numerous desktop applications. In this operation, the malware focuses on:
โ Harvesting credentials and session cookies from Chromium-based and Gecko-based browsers, with server-side decryption for newer Chrome builds.
โ Targeting a broad catalog of cryptocurrency browser extensions and standalone wallet applications in an effort to drain funds or resell seed phrases.
โ Extracting tokens and chat data from messaging platforms such as Telegram and Discord, along with other communication tools frequently used in gaming and creative communities.
โ Pulling configuration data from VPN clients and email programs like Thunderbird to support later lateral movement or business email compromise.
The Stealc family also continues to evolve its evasion layer. Analysts watching this campaign note that the sample tied to the Blender delivery path initially went undetected by security engines on multi-scanner platforms, which aligns with Stealcโs reputation for fast iteration and packing changes.
๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฎ๐น ๐ง๐ฅ๐ ๐ฎ๐ป๐ฑ ๐ต๐๐ป๐๐ถ๐ป๐ด ๐ฐ๐ผ๐ป๐๐ถ๐ฑ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐
From a detection and response standpoint, the interesting part of this campaign is the blend of benign-looking activity and a very conventional infostealer objective. Most SOCs do not have rules tuned for โsuspicious Blender project behavior,โ yet the observable telemetry still exposes several footholds for defenders who know where to look.
On endpoints that run Blender, security teams should pay attention to:
โ Blender processes that spawn Python or PowerShell in close succession, especially when accompanied by network connections to previously unseen domains or IP ranges.
โ PowerShell invoking download-and-execute patterns, including one-liners that use standard web cmdlets to retrieve remote scripts.
โ Archive extraction into the system temporary directory followed by the creation of shortcut files in Startup, particularly when the archive names do not match any known tooling in the environment.
โ New binaries or scripts that start shortly after Blender file opens, then persist independently of the main application.
Stealc-specific hunting then layers on top of that Blender-centric telemetry. Defenders should correlate web credential access from processes outside normal browser parents, large exfiltration bursts toward unfamiliar infrastructure, and rapid enumeration of wallet, browser, and VPN directories shortly after a suspect file opens. Threat intel from recent Stealc campaigns can provide C2 patterns and YARA rules suitable for deeper sweeps.
๐ฆ๐๐ฝ๐ฝ๐น๐-๐ฐ๐ต๐ฎ๐ถ๐ป ๐ฟ๐ถ๐๐ธ๐ ๐ถ๐ป ๐ฏ๐ ๐บ๐ผ๐ฑ๐ฒ๐น ๐บ๐ฎ๐ฟ๐ธ๐ฒ๐๐ฝ๐น๐ฎ๐ฐ๐ฒ๐
Public 3D marketplaces such as CGTrader and similar platforms function as supply-chain hubs in many studios and freelance pipelines. Artists often download rigs, props, and environments on tight deadlines and import them directly into client workspaces. Although those platforms enforce terms of service and provide general security guidance, they cannot feasibly statically or dynamically analyze every embedded script inside user-uploaded .blend files.
That reality creates a gap where adversaries can blend malicious files into a vast sea of legitimate content. In this Stealc campaign, the attackers leaned into that trust, publishing rigs that look useful and professional enough to attract both hobbyists and professionals. Once those assets spread organically through bookmarks, project folders, and shared drives, the malicious payload travels with them.
For security engineers, it helps to treat these marketplaces the same way you already treat public code repositories or open-source packages: as untrusted sources until proven otherwise.
๐๐ฒ๐๐ ๐ฝ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ๐ ๐ณ๐ผ๐ฟ ๐๐น๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐๐๐ฒ๐ฟ๐ ๐ฎ๐ป๐ฑ ๐๐๐๐ฑ๐ถ๐ผ๐
For individual artists and for studios with established pipelines, several practical steps reduce the blast radius of this class of attack without blocking Blender outright.
First, Blenderโs own documentation emphasizes caution around ๐๐๐๐ผ ๐ฅ๐๐ป ๐ฃ๐๐๐ต๐ผ๐ป ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐๐. Where possible, that option should remain disabled by default. Users can explicitly trust local projects they created themselves or files received through vetted internal channels, while treating downloads from marketplaces as untrusted until they pass review.
Second, organizations can isolate risky workflows. Many studios already segment render nodes and file servers; the same logic applies here. Running marketplace-sourced files inside dedicated virtual machines or sandboxed hosts reduces direct exposure of production passwords, SSO sessions, and payment credentials. That isolation also yields clean telemetry because background activity on those hosts tends to be more predictable.
Third, security teams can build simple internal guidelines for 3D asset hygiene: who can download external rigs, which paths Blender treats as trusted sources, and when it is acceptable to enable script execution permanently. Combining those policies with lightweight monitoring around Blender hosts gives defenders more signal and less guesswork.
๐ช๐ต๐ฎ๐ ๐๐ต๐ถ๐ ๐บ๐ฒ๐ฎ๐ป๐ ๐ณ๐ผ๐ฟ ๐ฏ๐ฟ๐ผ๐ฎ๐ฑ๐ฒ๐ฟ ๐ถ๐ป๐ณ๐ผ๐๐๐ฒ๐ฎ๐น๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ป๐ฑ๐
Stealc slots neatly into a much broader rise in infostealer operations. Recent industry reporting estimates that infostealers now drive enormous volumes of credential theft and contribute heavily to follow-on ransomware, account takeover, and cloud breaches. The Blender campaign does not introduce a brand-new malware family; instead, it illustrates how mature infostealers ride novel initial access paths into new communities.
For defenders, that pattern reinforces a familiar message. It is no longer enough to watch email gateways and office documents. Security programs that touch creative industries, gaming, or design should assume that 3D assets, texture packs, and plugin bundles can carry the same level of risk as browser extensions or cracked software.
One thought on “How Malicious Blender Files Deliver Stealc Malware to 3D Artists”