Malware & RansomwareHIGH

FBI Investigates Malware Spread Through Steam Games

BCBleepingComputer
SteammalwareFBIcryptocurrency theftinfostealer
🎯

Basically, the FBI is looking for gamers who installed infected games on Steam to help with an investigation.

Quick Summary

The FBI is investigating malware hidden in Steam games. Gamers who installed these titles may have had their accounts compromised. If you played these games, report your experience to help the investigation.

What Happened

The FBI has launched an investigation into malicious games uploaded to the Steam gaming platform. They are seeking information from gamers who may have been affected by malware? embedded in these games. Specifically, the FBI is targeting users who installed these games between May 2024 and January 2026. The agency has identified eight games, including titles like BlockBlasters and Chemia, that were found to contain malware? designed to steal sensitive information.

In a public notice, the FBI's Seattle Division emphasized the importance of identifying victims to aid their investigation. They are particularly interested in cases involving cryptocurrency theft and account hijacks that occurred after the installation of these games. Victims are encouraged to fill out a questionnaire to assist the FBI in tracking down the stolen funds and those responsible for distributing the malware?.

Who's Being Targeted

The malware? primarily targets gamers who unknowingly downloaded these infected titles. Notable incidents include a streamer who lost over $32,000 from his cryptocurrency? wallet after playing BlockBlasters. In total, it's estimated that around 478 victims may have been affected, with losses potentially reaching $150,000 across multiple accounts.

The Chemia game introduced a malware? variant known as HijackLoader, which further downloaded the Vidar information stealer. This malware? is notorious for harvesting credentials, cryptocurrency? wallets, and other sensitive data. The PirateFi game also distributed the Vidar? infostealer?, affecting up to 1,500 users before its removal from Steam.

Signs of Infection

Gamers who played these malicious titles may notice unusual activity related to their online accounts or cryptocurrency? transactions. Signs of infection can include:

  • Unauthorized access to accounts
  • Unexplained cryptocurrency? transactions
  • Notifications from antivirus software about malicious activity

The FBI has advised anyone who played these games to run antivirus scans and review their installed software. They should also consider reinstalling their operating systems to ensure their devices are clean from any lingering malware?.

How to Protect Yourself

If you believe you may have been affected, the FBI urges you to report your experience. You can fill out a form to share details about your situation, including any communications with individuals promoting the games. Keeping your software updated and using strong, unique passwords for your accounts can help protect against future threats.

Additionally, always be cautious when downloading games or software from online platforms. Verify the legitimacy of the game and check for reviews or warnings from other users. By staying informed and vigilant, you can better protect yourself from malware? and cyber threats.

💡 Tap dotted terms for explanations

🔒 Pro insight: The FBI's focus on cryptocurrency theft highlights the growing intersection of gaming and cybercrime, necessitating heightened security awareness among players.

Original article from

BleepingComputer · Lawrence Abrams

Read Full Article

Related Pings

HIGHMalware & Ransomware

SmartApeSG Campaign Deploys Remcos RAT via ClickFix Page

A new campaign is using a fake ClickFix page to spread Remcos RAT. Individuals and organizations are at risk of remote access and data theft. Stay vigilant and protect your systems from this growing threat.

SANS ISC Full Text·
HIGHMalware & Ransomware

Ransomware Negotiator Allegedly Extorted Victims for Millions

A ransomware negotiator is accused of extorting victims for millions. DigitalMint claims ignorance of his actions. This scandal raises serious concerns about trust in cybersecurity professionals.

SC Media·
HIGHMalware & Ransomware

New VENON Malware Targets Brazilian Banking Users

A new malware called VENON is targeting Brazilian banking users. This Rust-based threat employs advanced techniques to steal sensitive information. Stay alert and protect your accounts from this evolving danger.

SC Media·
HIGHMalware & Ransomware

Credential Theft: Storm-2561 Spoofs VPN Clients to Steal Logins

A new cybercrime group is spoofing VPN clients to steal user credentials. Cisco and Fortinet users are particularly at risk. Stay alert and ensure you’re downloading software from official sources to protect your data.

The Register Security·
HIGHMalware & Ransomware

Ransomware Responder Allegedly Aided BlackCat Cybercriminals

A cybersecurity responder allegedly aided BlackCat hackers in negotiating higher ransoms. This shocking breach of trust has raised alarms in the industry. DigitalMint has since terminated the involved parties and is enhancing oversight.

The Record·
HIGHMalware & Ransomware

Authorities Disrupt SocksEscort Proxy Service Linked to AVrecon Botnet

Authorities have disrupted the SocksEscort proxy service tied to the AVrecon botnet. This operation affected around 360,000 devices globally. Criminals used these compromised devices for various illegal activities, leading to significant financial losses for victims.

Security Affairs·
FBI Investigates Malware Spread Through Steam Games | CyberPings Cybersecurity News