Vidar Infostealer Campaign Steals Passwords, Cookies, Crypto Wallets, and Device Data
A highly evasive multi-stage malware campaign deploying the Vidar Infostealer. First discovered in late 2018 and built on the Arkei stealer source code, Vidar is notorious for aggressively harvesting user credentials, browser session cookies, cryptocurrency wallets, and detailed system data. Accordi
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Inside GPT-5.5-Cyber: Capabilities, Refusals, and Federal Briefings Explained
- [CYBER] Singapore universities assessing impact after global cyberattack on educational tool Canvas
- [CYBER] The Retention Moat Audit: 5 Questions That Reveal How Defensible Your SaaS Actually Is
- [CYBER] Judge clears path for Aave to move $71 million in ETH linked to North Korea hack
- [CYBER] CVE-2026-8209 - Gibbon Path Traversal DOS
- [CYBER] CVE-2026-8208 - Gibbon Local File Inclusion Remote Command Execution