Close Menu
    Latest post

    The craziest part of Musk v. Altman happened while the jury was out of the room

    May 1, 2026

    Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use

    May 1, 2026

    How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

    May 1, 2026

    Facebook X (Twitter) Instagram
    Trending
    • The craziest part of Musk v. Altman happened while the jury was out of the room
    • Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use
    • How Shivon Zilis Operated as Elon Musk’s OpenAI Insider
    • Alibaba’s Metis agent cuts redundant AI tool calls from 98% to 2% — and gets more accurate doing it
    • Modern transfer protocols evolving to protect cloud data
    • Spotify Will Now Verify Non-AI Artists
    • PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
    • Professionalizing Your Startup’s Internal Operations for Scale
    Instagram LinkedIn
    TechFlowDaily
    Friday, May 1
    • Home
    • Tech
    • AI
    • Cloud
    • Cyber
    • Data
    • Gadgets
    • Software
    • Startups
    TechFlowDaily
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    Home»Cyber»Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
    Cyber

    Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files

    editorial teamBy editorial teamApril 27, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New research from the Lat61 Threat Intelligence Team at Point Wild reveals that hackers are now hiding malicious code inside everyday files like JPEG images and text documents to deploy a new version of the notorious Vidar infostealer. Vidar has, reportedly, undergone a major transformation, evolving from a simple password-stealer into a highly adaptable attack framework using a multi-stage infection chain.

    Different ways of tricking users- The latest trend

    Researchers note that scammers are now less interested in finding technical gaps and more in social engineering. More prominently, they are exploiting a recent source code leak called Claude Code, where they basically set up fake repositories on GitHub to lure developers into downloading a malicious file, thinking it as the tool’s free or unlocked version.

    Hackers also use Reddit and Discord to offer fake video game cheats and exploit WordPress websites to display fake CAPTCHA prompts (called ClickFix pages), which encourage users to run a specific command to verify they are human. In reality, it triggers a multi-stage infection chain. Lat61’s research is about this infection chain, which they found starts with a VBScript and PowerShell scripts leading to the deployment of a Go-compiled loader.

    “Building on these insights, our analysis shifts focus beyond initial compromise and into the post-exploitation phase, where the true impact of the infection unfolds. This analysis by Point Wild highlights a sophisticated, multi-stage malware campaign that leverages layered obfuscation, staged payload delivery, and trusted Windows components to achieve stealthy execution and persistence,” researchers explained in their blog post.

    The Hidden Image Attack

    What makes Vidar infostealer’s 2026 version more dangerous is its stealth. When a device gets infected, the malware uses an IP-based delivery infrastructure to download files like ‘160066.jpg’ and various TXT files from this address (62.60.226.200). These normal-looking image/text files are actually payload containers embedding Base64 data.

    One of the malicious JPEG images used in the campaign (Image credit: Point Wild)

    Additionally, the malware now uses Living-off-the-Land (LotL) techniques, which involve abusing trusted Windows binaries such as WScript, PowerShell, and RegAsm.exe to blend into normal system processes. Through steganography, it scans these files for secret markers to extract Base64-encoded data, and instead of downloading a separate virus file, it reconstructs the final Vidar payload from this hidden data.

    Through .NET reflective loading, the code is run directly in the computer’s memory, which makes this fileless method particularly dangerous because the malicious code is never stored on the hard drive, so it avoids detection by most security scanners.

    Widespread Data Theft

    The final goal is obviously data exfiltration. This version can steal data from 200+ browser extensions on Google Chrome and Microsoft Edge, and specifically targets crypto wallets, login credentials, and session data to give hackers access to private accounts.

    The stolen data is sent back to the attackers’ server via Telegram and Cloudflare-fronted domains as it helps them keep their tracks hidden.

    Attack Chain (Credit: Point Wild)

    Dr. Zulfikar Ramzan, head of the Lat61 Threat Intelligence Team, explained that using image files as “covert carriers” is a clever move to make the attack look like normal web traffic.

    “Threat actors weaponized the recent Claude Code leak by seeding fake GitHub repositories with trojanized tools that delivered Vidar infostealer. What’s notable here is the evolution of the payload delivery through steganographic techniques such as using JPEG and TXT files as covert carriers and executing everything in memory to thwart forensics.”

    If you are a developer or about to become one, it is advised to avoid running commands without understanding their impact or downloading files from unofficial GitHub pages or suspicious pop-up prompts.

    CAPTCHAs fake Files Hides Infostealer JPEG Spreads TXT Vidar
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticlePower Systems Studies with Simulink and Simscape Electrical
    Next Article Ford’s Mustang Cobra Jet sets a new EV quarter mile record at 6.87 seconds
    editorial team
    • Website

    Related Posts

    Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use

    May 1, 2026

    PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

    April 30, 2026

    PoC Disclosed for Critical Root ASUSTOR ADM RCE Flaw

    April 30, 2026

    10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres IT-Sicherheitstechnik-Teams frei

    April 30, 2026
    Leave A Reply Cancel Reply

    Latest Post

    The craziest part of Musk v. Altman happened while the jury was out of the room

    May 1, 2026

    Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use

    May 1, 2026

    How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

    May 1, 2026

    Alibaba’s Metis agent cuts redundant AI tool calls from 98% to 2% — and gets more accurate doing it

    May 1, 2026
    • Instagram
    • LinkedIn
    Don't Miss
    Gadgets

    The craziest part of Musk v. Altman happened while the jury was out of the room

    By editorial teamMay 1, 20260

    Okay, I am not a lawyer so I only understood about half of what just…

    Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use

    May 1, 2026

    How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

    May 1, 2026

    Alibaba’s Metis agent cuts redundant AI tool calls from 98% to 2% — and gets more accurate doing it

    May 1, 2026

    Instagram LinkedIn
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.