Vidar Malware is Back: New Aryaka Threat Research Report

Vidar, a well-known info-stealing malware, is making the rounds again with a few new tricks. In a new report, Aryaka’s Threat Research Lab dives into what’s happening and what you can do to protect your team.
Over the past few weeks, our researchers tracked a fresh Vidar campaign aimed squarely at everyday Windows users—the folks who live in their browsers, jump between SaaS apps, and keep credentials saved for convenience. The goal is simple: steal what unlocks your digital life (passwords, cookies, autofill data, crypto wallets, auth tokens) and quietly ship it out. What’s different this time is how smoothly Vidar slips past basic defenses and blends into normal activity, making it harder to spot with point tools alone. Below is what’s going on, why it matters, and the immediate steps we recommend.
Executive Summary (at a glance)
- Vidar arrives through common lures (phishing, shady downloads) and sets itself to run again after reboot.
- It focuses on browser-stored data, such as passwords, cookies, and tokens that can grant account access without a password prompt.
- It hides control instructions on public platforms, then quietly exfiltrates data over encrypted web traffic.
- The targets aren’t niche; if your organization uses Chromium-based browsers and SaaS, you’re in scope.
- Layered, identity-aware controls and smarter egress monitoring are the best counters.
Background
Vidar has been around for years and is sold “as a service,” which means many different actors can rent it and run their own campaigns. That’s why it pops up in waves—whenever a new crew turns the crank.
How the attack plays out
- The foot in the door: A user clicks a convincing attachment or download.
- Setting up shop: The malware tweaks settings to avoid basic checks and ensures it starts again later.
- The grab: It hunts for the good stuff—browser passwords, cookies, tokens, wallet files, screenshots.
- Phone home: It finds control servers using “dead-drops” (public pages that quietly hold pointers), then sends data out over normal-looking HTTPS traffic.
Why this Matters
Modern work runs through the browser. If an attacker grabs your cookies and tokens, they can often waltz into SaaS apps and cloud consoles without ever cracking a password. That means account takeover, lateral movement, and data exposure even if MFA is solid and endpoint AV is green.
Impact
Who’s most at risk
- Teams that rely heavily on web apps and keep credentials saved in the browser
- Contractors, sales, finance, and anyone who uses multiple SaaS tools daily
- Organizations with uneven policy enforcement between remote users and branch locations
Business fallout (in real terms)
- Account misuse & fraud: Unauthorized purchases, wire attempts, gift-card scams, or invoice tampering
- Data exposure: Customer PII, financials, source files, internal roadmaps
- Operational drag: Time spent rotating credentials, revoking sessions, and chasing suspicious logins
How Aryaka helps fight against Vidar Malware
Aryaka’s Unified SASE as a Service brings networking, security, and observability together so you can see—and stop—this kind of campaign across users and sites:
- Zero-Trust access with posture checks: Only healthy, policy-compliant devices reach sensitive apps.
- Secure Web Gateway + NGFW/IPS: Granular controls for risky downloads and suspicious encrypted uploads—without crushing user experience.
- CASB/DLP for SaaS: Detect and block the silent movement of sensitive data and credential stores.
- Unified visibility: One place to correlate user identity, device posture, and egress behavior, so “quiet” attacks aren’t invisible.
Expect more trust abuse and fewer loud exploits. Defenders who connect the dots between identity, device health, and web traffic will have the advantage.
Get the full analysis
For technical details, indicators, and detection logic you can put to work immediately:
