cryptonews
2025-12-23 19:04:27

Gamers at Risk as Fake Roblox Mods Spread Crypto-Stealing Malware

Kaspersky researchers have uncovered Stealka, a sophisticated infostealer masquerading as game mods and pirated software that targets crypto wallets and browser credentials across over 115 extensions. The malware spreads through trusted platforms, including GitHub, SourceForge, and Softpedia, where attackers create professional-looking fake websites and repositories to distribute the threat under the guise of popular game cheats for titles like Roblox and GTA V. Attackers exploited the website. | Source: Kaspersky The discovery marks the latest escalation in a broader pattern of gaming-focused malware campaigns, as cybercriminals increasingly exploit the trust gamers place in modding communities. Attackers leverage popular search terms and authentic-looking download pages to lure victims, with some sites falsely claiming that virus scans are conducted before downloads, even though no such verification occurs. The malicious files appear deliberately deceptive; one fake site advertised Half-Life 3 while describing it as “ professional software solution designed for Windows, ” using popular gaming titles merely as bait to maximize search engine visibility. Source: Kaspersky Extensive Arsenal Targets Crypto Wallets According to the security firm, Stealka’s capabilities extend far beyond basic credential theft, targeting data from browsers built on Chromium and Gecko engines, putting over 100 applications, including Chrome, Firefox, Opera, and Edge, at immediate risk. The malware extracts autofill data, session tokens, and cookies that allow attackers to bypass two-factor authentication and hijack accounts without passwords, while simultaneously targeting 115 browser extensions for crypto wallets, password managers, and authentication services. High-value targets include crypto wallets such as Binance, Coinbase, MetaMask, Trust Wallet, and Phantom, as well as password managers such as 1Password, Bitwarden, LastPass, and NordPass. The stealer downloads local configurations from 80 wallet applications, encompassing Bitcoin , Ethereum , Exodus, Monero , and Dogecoin , that may contain encrypted private keys and seed phrase data sufficient to compromise holdings. Beyond crypto assets, Stealka infiltrates messaging apps like Discord and Telegram, email clients including Outlook and Thunderbird, gaming platforms such as Steam and Roblox launchers, VPN clients like ProtonVPN and Surfshark, and note-taking apps where users often improperly store sensitive information. The malware additionally harvests system data, installed program lists, hardware specifications, and captures screenshots to maximize intelligence gathering. Attackers have used compromised accounts to spread the malware further, with Kaspersky discovering the stealer in a GTA V mod posted by a previously hijacked account on a dedicated modding site. Industry Faces Mounting Security Crisis The Stealka campaign emerges amid catastrophic industry-wide security failures, as crypto platforms have lost $9.1 billion in 2025 alone, which is 10% of the $90 billion stolen over the past 15 years. In November , losses exceeded $276 million, pushing the annual total past historical records. “ Crypto is facing a security reckoning ,” said Mitchell Amador , CEO of Immunefi, a crowdsourced security platform protecting $180 billion in assets. “ Most hacks this year haven’t occurred due to poor audits—they’ve happened after launch, during protocol upgrades, or through integration vulnerabilities. “ Amador emphasized that 99% of Web3 projects operate without basic firewalls while fewer than 10% deploy modern AI security tools, calling the sector’s approach “ willful negligence. “ The human element has become the primary attack surface, with threat actors shifting from code vulnerabilities to operational security breaches as smart contracts become harder to exploit. “ The threat landscape is shifting from on-chain code vulnerabilities to operational security and treasury-level attacks, ” Amador explained. “As code hardens, attackers target the human element.” North Korea's Famous Chollima hides malware in smart contracts via EtherHiding, posing as job recruiters after stealing $1.3B in 2024 and $2.2B in H1 2025. #NorthKorea #Blockchain https://t.co/8W6Pfj41u8 — Cryptonews.com (@cryptonews) October 17, 2025 Kaspersky’s broader research reveals a sustained malware ecosystem, having previously documented the GitVenom campaign involving hundreds of fake GitHub repositories, SparkKitty mobile malware that infiltrated Apple’s App Store and Google Play to steal seed phrase screenshots via OCR, and ClipBanker trojans hidden in fake Microsoft Office downloads. North Korean threat groups have also escalated tactics by weaponizing blockchain technology itself, embedding malware payloads in smart contracts on the BNB Smart Chain and Ethereum, creating a decentralized command-and-control infrastructure that law enforcement cannot shut down. For now, Kaspersky recommends users to do the following: Deploy reliable antivirus software. Avoid storing sensitive credentials in browsers. Exercise extreme caution with game cheats and pirated software. Enable two-factor authentication with backup codes stored in encrypted password managers rather than text files. Refrain from downloading software from untrusted sources despite the convenience they may offer. The post Gamers at Risk as Fake Roblox Mods Spread Crypto-Stealing Malware appeared first on Cryptonews .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.