Vidar stealer abuses Mastodon to silently get C2 configuration

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,518
15,624
3,578
53
Germany / Poland
The Vidar stealer has returned in a new campaign that abuses the Mastodon social media network to get C2 configuration without raising alarms.

The particular malware has been active since at least October 2018 and we've seen it in numerous different campaigns. The reason why it’s so widely deployed is that it remains effective in its job and is also easy to source through Telegram channels and underground forums where it sells for as little as $150.

The data that Vidar attempts to steal from infected machines includes the following:
 
  • Like
Reactions: upnorth