Vidar Malware Campaign Uses Fake YouTube Downloads to Steal Corporate Credentials


Vidar malware is being spread through fake software downloads promoted in YouTube videos, putting corporate users at risk of credential theft, browser data theft, and crypto wallet compromise.

Security researchers linked the campaign to a fake tool called NeoHub. Victims were directed from YouTube to file-sharing pages, then pushed toward a malicious archive hosted on Mediafire. Once opened, the archive launched a staged infection designed to look like a normal software install.

The campaign shows why infostealers remain one of the most dangerous threats for businesses. A single infected employee device can expose saved passwords, session cookies, browser autofill data, payment details, and files tied to crypto wallets. That stolen data can then help attackers break into company accounts.

How the Vidar campaign works

The attack begins with social engineering rather than a software vulnerability. Threat actors use YouTube videos to advertise fake software and make the download appear legitimate.

After the victim follows the link, the attack chain moves through file-sharing infrastructure. The final download contains a visible executable named NeoHub.exe, which appears to act like a standard installer.

Targeting Web Browsers (Source – Intrinsec)

Behind the scenes, the executable loads a second file named msedge_elf.dll. Researchers said this DLL carries the actual Vidar payload and mimics a Microsoft Edge component to look less suspicious during a quick inspection.

What Vidar steals from infected systems

Vidar is an infostealer, which means its main purpose is to collect sensitive data from infected Windows machines.

The malware targets major browsers, including Chrome, Firefox, Edge, Opera, Vivaldi, Waterfox, and Pale Moon. It can collect saved passwords, cookies, credit card data, autofill records, and cryptocurrency wallet files.

Stolen browser cookies create a major risk because they may let attackers hijack sessions without needing the victimโ€™s password. This can weaken account protection even when a company uses multi-factor authentication.

Targeted dataWhy attackers want it
Saved passwordsDirect access to business and personal accounts
Browser cookiesSession hijacking and MFA bypass attempts
Autofill dataNames, addresses, phone numbers, and payment details
Credit card dataFraud and resale
Crypto wallet filesDirect theft of digital assets
Corporate credentialsVPN, SaaS, email, and internal tool access

Fake certificates and packed payloads add cover

The campaign also used fake code-signing details to make malicious files look more trustworthy. One version reportedly impersonated GitHub with the name githab.com, while another impersonated grow.com.

Fake Certificate (Source – Intrinsec)

The malicious DLL used a Go-based packer with unusual section names and control-flow flattening. This makes analysis harder and can slow down detection by security tools.

Vidar also avoids hardcoding one command-and-control address. Instead, it uses a Dead Drop Resolver technique, hiding C2 location details inside public services such as Steam profiles and Telegram channels. This gives attackers a way to change infrastructure without rebuilding the malware.

Why this campaign matters for companies

Vidar infections do not stop at the first compromised user. Stolen credentials often end up in underground marketplaces, where other attackers can buy access and search for useful business accounts.

CISA and partner agencies have also warned that Scattered Spider uses a wide range of social engineering and identity-focused techniques against large organizations. The updated advisory describes the group as a threat to major enterprises and says it targets help desks, identity systems, and high-value business environments.

That broader context matters because infostealer logs can feed larger intrusions. Attackers may use stolen credentials to access cloud apps, email accounts, VPN portals, admin consoles, and internal collaboration platforms.

Key campaign details

DetailInformation
Malware familyVidar
Campaign lureFake software promoted through YouTube videos
Fake tool nameNeoHub
Delivery pathYouTube link, file-sharing redirect, Mediafire archive
Visible fileNeoHub.exe
Payload filemsedge_elf.dll
Main goalCredential and browser data theft
Business riskAccount takeover, session hijacking, internal access
Defensive priorityStop unofficial downloads and monitor credential abuse

How organizations can reduce the risk

Companies should warn employees not to download software from YouTube descriptions, comments, shortened links, or file-sharing pages. Legitimate software should come from official vendor sites, verified app stores, or approved internal portals.

Security teams should also review whether employees store corporate passwords in browsers. Browser-based password storage creates extra risk when infostealers reach a device.

Endpoint protection, DNS filtering, web gateways, and file sandboxing can help block the attack earlier. However, user training still matters because this campaign relies heavily on convincing people to install fake tools.

Recommended actions:

  • Block software downloads from unapproved file-sharing sites.
  • Train users to avoid YouTube-linked installers.
  • Use application allowlisting on managed devices.
  • Disable browser password storage for corporate accounts where possible.
  • Enforce phishing-resistant MFA for sensitive systems.
  • Monitor for logins from unusual locations or new devices.
  • Rotate passwords after any confirmed infostealer infection.
  • Revoke active sessions after credential theft.
  • Hunt for suspicious msedge_elf.dll activity on Windows endpoints.
  • Block known malicious domains and IPs from published indicators.

What users should do after a suspected infection

A user who opened the fake NeoHub download should disconnect the device from the network and report it to IT immediately.

Changing passwords from the infected device is not enough. Attackers may already have stolen browser cookies, saved credentials, and wallet files. Password resets should happen from a clean device.

Security teams should also revoke active sessions for affected accounts, review sign-in logs, and check whether the user accessed sensitive business systems after the infection.

FAQ

What is Vidar malware?

Vidar is an information-stealing malware family that targets passwords, browser cookies, credit card data, autofill information, and crypto wallet files.

How does this Vidar campaign spread?

The campaign uses fake software downloads promoted through YouTube videos. Victims are pushed to file-sharing pages and then download a malicious archive.

What is NeoHub?

NeoHub is the fake software name used in this campaign. The visible installer is called NeoHub.exe, but it secretly loads a malicious DLL tied to Vidar.

Can MFA stop Vidar attacks?

MFA helps, but it may not fully stop account abuse if attackers steal active browser cookies. Companies should combine MFA with session revocation, device checks, and login monitoring.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages