Vidar Malware Hides as Microsoft Tool to Steal Passwords and Browser Data

The infamous Vidar Stealer malware has returned with a dangerous new trick—pretending to be Microsoft’s BGInfo.exe, a tool trusted by IT professionals. This new version is designed to silently steal browser cookies, stored passwords, and crypto wallet data.
Fake BGInfo.exe – A Trusted Tool Turned Threat
Vidar now disguises itself as BGInfo.exe, a legitimate system tool from Microsoft Sysinternals Suite.
- The original BGInfo file is 2.1 MB, but the fake version is 10.2 MB—a red flag.
- It copies version numbers, creation dates, and developer details to look authentic.
- The malware avoids detection by mimicking trusted software used by IT administrators.
Advanced Malware Behavior
Once run, the fake BGInfo doesn't perform its usual functions like showing system info on the desktop. Instead:
- It uses VirtualAlloc to create memory space for its malicious code.
- It hijacks normal execution flow using Windows API functions like RtlUserThreadStart.
- The malware secretly runs Vidar’s payload to steal sensitive information.
What Vidar Stealer Targets:
- Browser-stored credentials (usernames & passwords)
- Cookies & session tokens from platforms like Discord, AWS, and Steam
- Cryptocurrency wallets like BraveWallet & Monero
- Cloud credentials from tools like FileZilla and Microsoft Azure
Signs of Compromise:
- BGInfo not updating the desktop wallpaper
- Unusual process memory behavior
- Large executable file size and expired digital signature
- Debugging strings related to Telegram, Steam, and crypto wallets
Techniques Used by Attackers:
Vidar Stealer uses several stealth tactics recognized in the MITRE ATT&CK framework:
- Masquerading (T1036): Pretending to be legitimate software
- Binary Padding (T1027): Inflating file size to hide malicious code
- Thread Hijacking (T1055): Redirecting execution to its malware code
Vidar Stealer's latest deception proves that even trusted tools can be turned into powerful weapons by cybercriminals. Its ability to hide in plain sight, hijack system execution, and steal highly sensitive data is a wake-up call for organizations to stay proactive, vigilant, and well-protected.
Net Protector Cyber Security encourages all users to practice safe computing, use robust endpoint protection, and stay informed about evolving threats.
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (259)
- Data Backup (11)
- Data Breach (97)
- Phishing (154)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (68)
- Android Security (70)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)