Saturday, June 14, 2025
Homecyber securityVidar and StealC Malware Delivered Through Viral TikTok Videos by Hackers

Vidar and StealC Malware Delivered Through Viral TikTok Videos by Hackers

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated social engineering campaign that leverages the viral power of TikTok to distribute dangerous information-stealing malware, specifically Vidar and StealC.

This alarming trend marks a shift in cybercriminal tactics, moving away from traditional methods like fake CAPTCHA pages to exploiting the vast user base and algorithmic reach of social media platforms.

Unlike previous attacks that relied on detectable malicious code or compromised websites, this campaign uses carefully crafted video content potentially AI-generated to deceive users into executing harmful PowerShell commands under the guise of activating legitimate software like Windows OS, Microsoft Office, or Spotify.

- Advertisement - Google News

With one video reportedly garnering over 500,000 views, the potential scale of this threat is staggering, posing significant risks to both individual users and businesses through data exfiltration and credential theft.

New Social Engineering Threat on Social Media

The campaign operates through TikTok accounts such as @gitallowed, @zane.houghton, and others, which have since been deactivated.

StealC Malware
widespread exposure and potential impact of the campaign

According to Trend Micro Report, these accounts posted faceless videos with AI-generated voices providing step-by-step instructions to users, guiding them to open PowerShell via the Windows + R command and execute scripts from URLs like hxxps://allaivo[.]me/spotify.

These scripts initiate a malicious chain of execution, creating hidden directories in APPDATA and LOCALAPPDATA folders, adding them to Windows Defender’s exclusion list to evade detection, and downloading secondary payloads identified as Vidar or StealC from domains like hxxps://amssh[.]co/file.exe.

Hackers Exploit TikTok’s Algorithmic Reach

The malware establishes persistence through registry keys and connects to command-and-control (C&C) servers, some of which abuse legitimate platforms like Steam and Telegram to obscure their infrastructure.

This method of delivery, relying entirely on visual and auditory social engineering rather than embedded malicious code, makes traditional detection mechanisms less effective and highlights the evolving nature of cyber threats.

For businesses and individuals, the implications are severe, as these attacks exploit user trust rather than technical vulnerabilities.

Security strategies must adapt by integrating social media threat intelligence to monitor emerging campaigns, employing behavioral analysis to detect anomalous activities like unexpected PowerShell executions, and enhancing user education to recognize and report suspicious content.

StealC Malware
malicious PowerShell script

Trend Vision One offers a robust defense against such threats, providing AI-powered cybersecurity tools, threat insights, and hunting queries to detect indicators of compromise (IOCs) associated with this campaign.

As cybercriminals continue to weaponize popular platforms like TikTok, proactive measures and awareness are critical to mitigating the risks of mass compromise.

Indicators of Compromise (IOCs)

TypeValue
File Hash3bb81c977bb34fadb3bdeac7e61193dd009725783fb2cf453e15ced70fc39e9b
File Hashafc72f0d8f24657d0090566ebda910a3be89d4bdd68b029a99a19d146d63adc5
File Hashb8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886
URLhxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php
URLhxxps://allaivo[.]me/spotify
URLhxxps://amssh[.]co/file[.]exe
URLhxxps://amssh[.]co/script[.]ps1
URLhxxps://steamcommunity[.]com/profiles/76561199846773220
URLhxxps://t[.]me/v00rd
IPhxxps://49[.]12[.]113[.]201
IPhxxps://116[.]202[.]6[.]216

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...