Vidar info-stealing malware spreads via 1,300 domains impersonating AnyDesk site

Share post:

Attackers are spreading Vidar information stealing malware using 1,300 domains impersonating AnyDesk official site. The malicious activity was uncovered by SEKOLA threat analyst crep1x. Crep1x shared the complete list of the malicious hostnames all of which linked to the same IP address of 185.149.120[.]9.

The malicious hostnames include typosquats for AnyDesk, MSI Afterburner, 7-ZIP, Blender, Dashlane, Slack, VLC, OBS, cryptocurrency trading apps, and others.

According to the researcher, the cloned sites pretended to be an installer for the AnyDesk software, and they were distributing a ZIP file named ‘AnyDeskDownload.zip.’ The installer then installs Vidar stealer instead of installing the remote access software.

After installation, the malware steals victims’ browser history, account credentials, saved passwords, cryptocurrency wallet data, banking information, and other sensitive data. The data will then be sent back to the attackers who could use it for other malicious activities.

To avoid clicking on promoted results (ads) in Google Search, users are advised to bookmark the sites they use for downloading software. They are also advised to find the official URL of a software project from their Wikipedia page or their OS’s package manager.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Exploited ChatGPT Vulnerability Poses Risks to Organizations

A server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure, tracked as CVE-2024-27564, is being actively exploited by...

Free Online File Converters Found Installing Malware: Malwarebytes Sounds the Alarm

Cybersecurity company Malwarebytes is urging internet users to exercise caution when seeking free online file conversion tools, warning...

Researchers Crack Akira Ransomware Using High-End GPUs

The Akira ransomware group emerged in 2023 with a mix of dark humour and ruthless tactics, famously requesting...

DOGE Staffer Sends Unencrypted Personal Data

Court documents reveal that Marko Elez, a staff member of the Department of Government Efficiency (DOGE), breached Treasury...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways