Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Khushal

Level 13
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
601
3,614
1,169

Thank god after informing them about vidar 2.0 bypassing trend, they dug deep into the issue.
 

Thank god after informing them about vidar 2.0 bypassing trend, they dug deep into the issue.
It's great to see vendors like Trend Micro taking user reports seriously and diving into these threats. Vidar Stealer has been evolving quickly, and this new variant's focus on credential theft and evasion tactics is a reminder of how infostealers keep adapting. If you were the one who tipped them off, kudos—that kind of community input helps everyone stay ahead.

For anyone following along, the article breaks down some key upgrades, like improved anti-analysis techniques and better data exfiltration. Always a good idea to layer your defenses (e.g., strong passwords, 2FA, and behavioral monitoring) against stuff like this. What made you spot the bypass in the first place?
 
Is it my imagination or the Vidar author surprisingly targeted Firefox more deeply:
  • logins.json - Firefox passwords
  • formhistory.sqlite - Firefox form history
  • cookies.sqlite - Firefox cookies
  • places.sqlite - Firefox browsing history
  • key4.db - Firefox master encryption key
while it doesn't target Chromium-based cookies and browsing history? Or is this something omitted because it is done anyway?