Vidar malware distributed through website impersonating disney plus

Intel Name: Vidar malware distributed through website impersonating disney plus

Date of Scan: July 25, 2025

Impact: High

Summary:
Our team uncovered a malicious website impersonating Disney+, used to deliver the Vidar infostealer malware. The site posed as an influencer collaboration portal, luring users into executing malware hosted on a WebDAV server. Clicking the “View Full Brief” button triggered a multi-stage infection chain involving Windows shortcuts, PowerShell, MSHTA, VBS, and obfuscated JavaScript. A decoy PDF was displayed while the malware executed silently in the background. This campaign dates back to at least July 5, 2025. While many URLs are now inactive, the domain disneyplus[.]business remains live and may be used in future attacks.

More Details