Video game mods are spreading new ‘Stealka’ crypto infostealer: Kaspersky

cointelegraphPublished on 2025-12-22Last updated on 2025-12-22

Abstract

A new malware called "Stealka" is targeting cryptocurrency wallets and browser extensions by disguising itself as video game cheats, mods, and software cracks, according to Kaspersky. The infostealer, discovered in November, is distributed through legitimate platforms like GitHub and Google Sites, and sometimes via fake professional-looking websites. It primarily targets Chromium and Gecko-based browsers—including Chrome, Firefox, and Edge—and steals autofill data, login credentials, and payment details. It also specifically targets 115 browser extensions related to crypto wallets, 2FA services, and password managers, including Binance, MetaMask, Trust Wallet, and Coinbase. Kaspersky advises using reliable antivirus software, avoiding pirated software and unofficial mods, and refraining from storing passwords in browsers.

New malware has been discovered that targets crypto wallets and browser extensions while disguising itself as game cheats and mods, says cybersecurity firm Kaspersky.

Kaspersky reported on Thursday that it had uncovered a new infostealer dubbed “Stealka,” which targets Microsoft Windows user data.

Attackers have used the malware, which was discovered in November, to hijack accounts, steal cryptocurrency, and install crypto miners on their victims’ computers while masquerading as video game cracks, cheats, and mods.

The malicious software has been distributed through legitimate platforms like GitHub, SourceForge, and Google Sites, and disguised as game mods, especially for Roblox, and software cracks for applications such as Microsoft Visio.

Sometimes, attackers go a step further, possibly using artificial intelligence tools, and creating entire fake websites that look “quite professional,” said Kaspersky researcher Artem Ushkov.

A fake website pretending to offer Roblox scripts, Source: Kaspersky

Crypto wallets and extensions targeted

Ushkov noted that Stealka has a fairly “extensive arsenal of capabilities,” but is particularly dangerous because its prime target is data from browsers built on the Chromium and Gecko engines.

This puts over 100 different browsers at risk, including popular ones such as Chrome, Firefox, Opera, Yandex, Edge, Brave, and many others.

Related: Hackers are exploiting a JavaScript library to plant crypto drainers

Its primary targets are autofill data, such as sign-in credentials, addresses, and payment card details, but it also targets the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA (two-factor authentication) services.

Some of the 80 crypto wallets targeted include Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Nexus, and Exodus.

Kaspersky also said the messaging apps, including Discord, Telegram, Unigram, Pidgin, and Tox, were also at risk, as were email clients, password managers, gaming clients, and even VPN applications.

Avoid pirated software and game mods

To stay protected, Kaspersky recommended using reliable antivirus software and password managers to avoid storing passwords in browsers. It also cautioned against using pirated software and unofficial game mods.

Cloudflare reported last week that more than 5% of all emails sent worldwide contain malicious content, and more than half of those contained a phishing link, while a quarter of all HTML attachments were found to be malicious.

Magazine: Big questions: Would Bitcoin survive a 10-year power outage?

Related Questions

QWhat is the name of the new infostealer malware discovered by Kaspersky and what does it target?

AThe new infostealer is called 'Stealka'. It primarily targets data from browsers built on Chromium and Gecko engines, including autofill data (sign-in credentials, addresses, payment card details), and the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA services.

QHow is the Stealka malware being distributed to potential victims?

AThe malware is distributed by disguising itself as video game cracks, cheats, and mods. It has been spread through legitimate platforms like GitHub, SourceForge, and Google Sites. Attackers sometimes create entire fake, professional-looking websites to host the malicious software.

QWhich specific types of applications and services are at risk from the Stealka infostealer?

AOver 100 different browsers (Chrome, Firefox, Opera, etc.), 80 crypto wallets (Binance, Coinbase, MetaMask, etc.), messaging apps (Discord, Telegram, etc.), email clients, password managers, gaming clients, and VPN applications are all at risk.

QWhat recommendations does Kaspersky provide to protect against this threat?

AKaspersky recommends using reliable antivirus software, using password managers instead of storing passwords in browsers, and avoiding the use of pirated software and unofficial game mods.

QBeyond game mods, what other type of software is commonly used as a disguise for this malware?

AThe malware is also disguised as software cracks for applications such as Microsoft Visio.

Related Reads

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

The article describes an era where AI-generated content is flooding the market, forcing human authors to prove they are not machines. It begins with the example of dozens of AI-written, error-ridden biographies of Henry Kissinger appearing on Amazon within hours of his death, a pattern repeated for other deceased celebrities and even living experts who find fraudulent books under their names. This spam content has exploded, with monthly new book releases on platforms like Amazon reaching 300,000 by late 2025. The issue spans genres, from suspiciously high proportions of AI-written teen romance and self-help books to dangerous, AI-generated foraging guides containing lethal advice. The platforms' automated review systems, designed to catch plagiarism and banned words, are ill-equipped to detect AI-generated text that avoids these pitfalls while being nonsensical or fraudulent. The problem has infiltrated traditional publishing. A major publisher, Hachette, had to recall a bestselling horror novel after AI detection tools suggested 78% of its content was machine-generated. An acclaimed European philosophy book was later revealed to be entirely written by AI under a fake author persona. In response, authors are fighting back. At the 2026 London Book Fair, 10,000 writers published a blank book titled "Don't Steal This Book" containing only their signatures—using emptiness as a protest weapon in an age of AI overproduction. Initiatives like the "Human Author Certification" program have emerged, ironically placing the burden on humans to prove their work is not machine-made. The article warns of a vicious cycle: AI-generated low-quality books pollute the data used to train future AI models, leading to "model collapse" and an ever-worsening flood of digital waste, eroding trust in publishing and devaluing human creativity.

marsbit15m ago

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

marsbit15m ago

The King of Blind Date Attire in Korea: How SK Hynix Made a Comeback Against Samsung?

In South Korea's dating scene, SK Hynix employees are now highly sought after, a status shift fueled by the company's astronomical profits and employee bonuses, projected to reach up to 6.1 million RMB per person by 2027. This marks a dramatic reversal for the long-time second-place player in memory semiconductors, which has now surpassed its rival Samsung in annual operating profit. The turnaround story began in 2008 when a struggling Hynix, emerging from bankruptcy restructuring, took a risky bet by agreeing to develop High Bandwidth Memory (HBM) with AMD. At the time, HBM had no clear market beyond high-end graphics cards and was a costly, complex technology. Major players like Samsung, pursuing its own HMC technology, declined. For Hynix, with only memory as its core business, it was a gamble born of necessity. The pivotal moment came in 2012 when SK Group Chairman Chey Tae-won acquired Hynix. Defying industry downturns, he invested heavily in R&D and fabrication, sustaining the HBM project through over a decade of commercial uncertainty and internal challenges. A key break occurred around 2016-2017 when Samsung faced production issues supplying HBM2 for Google's TPU, allowing SK Hynix to gain a crucial foothold in the data center market. The AI explosion post-ChatGPT in 2022 was the catalyst, turning HBM into a critical bottleneck for AI accelerators like NVIDIA's GPUs. By 2025, SK Hynix captured 62% of the global HBM market, leaving Samsung at 17%. For the first time, its annual operating profit exceeded Samsung's. Analysts point to the "innovator's dilemma" to explain Samsung's miss: its vast, successful business portfolio made it risk-averse, preventing an all-in bet on the initially niche HBM technology. In contrast, SK Hynix, as a challenger with its back against the wall, had no choice but to commit fully. The story highlights how Korea's chaebol system allows for ultra-long-term bets beyond quarterly pressures. However, SK Hynix's lead isn't guaranteed. Samsung is aggressively catching up on HBM4, and challenges like customer concentration (heavy reliance on NVIDIA) and technical hurdles in advanced packaging remain. The narrative underscores a market truth: the greatest alpha often comes from betting on uncertain, long-term directions others dismiss, much like HBM in 2008.

marsbit55m ago

The King of Blind Date Attire in Korea: How SK Hynix Made a Comeback Against Samsung?

marsbit55m ago

Trading

Spot
Futures
活动图片