Hackers exploit 3D design software to target game developers, animators

Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware, according to new research.

Israel-based cybersecurity firm Morphisec said in a report this week that it had blocked several campaigns over the past six months in which attackers used Blender project files to deliver the StealC V2 infostealer. Blender is a widely used open-source 3D design program.

The attackers relied on malicious files posted on platforms such as CGTrader, an online marketplace for 3D models. Unsuspecting designers, animators and developers downloaded the malicious files, which were engineered to execute hidden Python scripts as soon as they were opened in Blender.

First advertised on dark-web forums in early 2023 for about $200 a month, StealC is used by criminal groups to steal browser data, target desktop crypto wallets and compromise messaging apps, VPN clients and web plugins. Its code avoids infecting computers with language set to Russian, Ukrainian, Belarusian or Kazakh — a pattern often seen in Russian cyber operations — and it is typically deployed against victims in North America, Western Europe and parts of Asia.

Morphisec said the issue stems from how Blender handles its .blend project files. Attackers can embed Python scripts inside them, and because Blender can automatically run certain scripts when a file opens, a malicious file can execute harmful code as soon as a user clicks on it.

While Blender files have been abused before, Morphisec said this is the first time such activity has been linked to StealC or to patterns associated with Russian-speaking threat actors.

The firm has not attributed the operation to a specific group but said the campaign appeared similar to past activity in which attackers impersonated the digital rights group Electronic Frontier Foundation to target gaming communities using StealC V2 and Pyramid C2 infrastructure.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

Next Post

Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets

Related Posts

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated
Read More

Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook

Picture this: Your team rolls out some new code, thinking everything's fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big
Read More