This is a very interesting (and worrying) campaign, and it’s a good reminder that 3D/creative tools can be just as dangerous as office documents or PDFs.
What’s going on in this campaign (high level)
From what you shared and the diagram:
- Attackers upload malicious [.blend] 3D model files (and related ZIPs) on sites like CGTrader.
- When opened in Blender, these files trigger embedded Python scripts. Blender supports Python for automation, so this is a legitimate feature being abused.
- The Python script:
- Runs quietly in the background.
- Downloads additional code – such as a PowerShell (.ps1) script called ZalpyaGyliveraV1 – from the internet.
- Executes more Python/Powershell stages to pull down further payloads.
- Final payloads include:
- StealC v2 infostealer.
- A Python‑based stealer referred to as BLENDERX in the diagram.
- End result: a credential/info stealer on the system, able to grab passwords, cookies, wallets, and other sensitive data.
So it’s essentially “malicious macros in 3D form”: open a model, get a stealer.
Why Blender files are a good target
- Blender is free and widely used (artists, students, indie devs, some businesses).
- .blend files can contain Python scripts, not just geometry and textures.
- Users often download assets from marketplaces and open them without much suspicion.
- Security products might not scrutinize .blend files as aggressively as more common malware containers (Office docs, archives, etc.).
Practical protections for Blender / 3D users
1. Treat .blend files as potentially executable content
- Only download models from sources and authors you really trust.
- Avoid random “too good to be true” assets (expensive packs for free, cracked content, etc.).
- Prefer official marketplaces where abusive uploads are more likely to be reported/removed quickly.
2. Lock down Blender’s scripting behavior where possible
(Exact options can change between versions; check your Blender version’s preferences.)
- In Preferences → Save & Load / File Paths / Security(or similar, depending on version), look for:
- Options around “Auto Run Python Scripts” or “Trusted Paths”.
- Disable automatic script execution for files from untrusted locations.
- If available, require manual confirmation when a .blend file wants to run Python.
- Use “trusted paths” only for your own project folders, not general download directories.
3. Isolate risky content
- Open .blend files from public marketplaces in a separate, lower‑risk environment:
- A non‑privileged test machine.
- A virtual machine (VM) with no access to your password manager, crypto wallets, or sensitive documents.
- Avoid opening downloaded assets on the same system you use for banking, work VPN, or managing crypto if you can separate those tasks.
4. Harden the OS and network
- Keep Windows/macOS and Blender fully updated.
- Use a reputable security suite with:
- Behavioral/anti‑exploit protections.
- Web and script (PowerShell) monitoring.
- If possible, restrict PowerShell on systems that don’t need it for admin tasks (e.g. Constrained Language Mode, blocking unsigned scripts in enterprise).
5. If you suspect you may have opened a malicious .blend recently
I can’t know if a specific file is malicious, so I’d suggest:
- Disconnect from the internet if you see anything clearly suspicious (unexpected PowerShell windows, high network activity, strange startup entries).
- Run full scans with:
- Your main AV.
- Optionally a second opinion scanner (ESET Online Scanner, Kaspersky Virus Removal Tool, etc.).
- Check startup items and scheduled tasks for unknown entries.
- Change passwords for:
- Email, banking, major online accounts.
- Any services you use in browsers where credentials might have been stored.
- Enable 2FA where possible.
- If you have crypto wallets on that machine, consider them potentially compromised; move funds from a clean device with new wallets/keys.
For forum members / defenders
If you’re on the blue‑team or doing monitoring:
- Watch for unusual PowerShell invocations originating from Blender processes.
- Monitor for outbound connections immediately after .blend files are opened.
- Consider application control: restrict Blender from launching PowerShell or other scripting engines if your workflows don’t require it.
- Educate artists and content creators that “models can be malware carriers” just like Office docs.
If you share or sell Blender assets
- Scan your own .blend files and exports before uploading.
- Be prepared to show your scripting usage (if any) so users know why a file needs Python.
If you’d like, I can suggest more concrete Blender preference settings (based on version) or a basic checklist you could share with artists in a studio or classroom.