Video game mods are spreading new ‘Stealka’ crypto infostealer: Kaspersky

cointelegraph发布于2025-12-22更新于2025-12-22

文章摘要

A new malware called "Stealka" is targeting cryptocurrency wallets and browser extensions by disguising itself as video game cheats, mods, and software cracks, according to Kaspersky. The infostealer, discovered in November, is distributed through legitimate platforms like GitHub and Google Sites, and sometimes via fake professional-looking websites. It primarily targets Chromium and Gecko-based browsers—including Chrome, Firefox, and Edge—and steals autofill data, login credentials, and payment details. It also specifically targets 115 browser extensions related to crypto wallets, 2FA services, and password managers, including Binance, MetaMask, Trust Wallet, and Coinbase. Kaspersky advises using reliable antivirus software, avoiding pirated software and unofficial mods, and refraining from storing passwords in browsers.

New malware has been discovered that targets crypto wallets and browser extensions while disguising itself as game cheats and mods, says cybersecurity firm Kaspersky.

Kaspersky reported on Thursday that it had uncovered a new infostealer dubbed “Stealka,” which targets Microsoft Windows user data.

Attackers have used the malware, which was discovered in November, to hijack accounts, steal cryptocurrency, and install crypto miners on their victims’ computers while masquerading as video game cracks, cheats, and mods.

The malicious software has been distributed through legitimate platforms like GitHub, SourceForge, and Google Sites, and disguised as game mods, especially for Roblox, and software cracks for applications such as Microsoft Visio.

Sometimes, attackers go a step further, possibly using artificial intelligence tools, and creating entire fake websites that look “quite professional,” said Kaspersky researcher Artem Ushkov.

A fake website pretending to offer Roblox scripts, Source: Kaspersky

Crypto wallets and extensions targeted

Ushkov noted that Stealka has a fairly “extensive arsenal of capabilities,” but is particularly dangerous because its prime target is data from browsers built on the Chromium and Gecko engines.

This puts over 100 different browsers at risk, including popular ones such as Chrome, Firefox, Opera, Yandex, Edge, Brave, and many others.

Related: Hackers are exploiting a JavaScript library to plant crypto drainers

Its primary targets are autofill data, such as sign-in credentials, addresses, and payment card details, but it also targets the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA (two-factor authentication) services.

Some of the 80 crypto wallets targeted include Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Nexus, and Exodus.

Kaspersky also said the messaging apps, including Discord, Telegram, Unigram, Pidgin, and Tox, were also at risk, as were email clients, password managers, gaming clients, and even VPN applications.

Avoid pirated software and game mods

To stay protected, Kaspersky recommended using reliable antivirus software and password managers to avoid storing passwords in browsers. It also cautioned against using pirated software and unofficial game mods.

Cloudflare reported last week that more than 5% of all emails sent worldwide contain malicious content, and more than half of those contained a phishing link, while a quarter of all HTML attachments were found to be malicious.

Magazine: Big questions: Would Bitcoin survive a 10-year power outage?

相关问答

QWhat is the name of the new infostealer malware discovered by Kaspersky and what does it target?

AThe new infostealer is called 'Stealka'. It primarily targets data from browsers built on Chromium and Gecko engines, including autofill data (sign-in credentials, addresses, payment card details), and the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA services.

QHow is the Stealka malware being distributed to potential victims?

AThe malware is distributed by disguising itself as video game cracks, cheats, and mods. It has been spread through legitimate platforms like GitHub, SourceForge, and Google Sites. Attackers sometimes create entire fake, professional-looking websites to host the malicious software.

QWhich specific types of applications and services are at risk from the Stealka infostealer?

AOver 100 different browsers (Chrome, Firefox, Opera, etc.), 80 crypto wallets (Binance, Coinbase, MetaMask, etc.), messaging apps (Discord, Telegram, etc.), email clients, password managers, gaming clients, and VPN applications are all at risk.

QWhat recommendations does Kaspersky provide to protect against this threat?

AKaspersky recommends using reliable antivirus software, using password managers instead of storing passwords in browsers, and avoiding the use of pirated software and unofficial game mods.

QBeyond game mods, what other type of software is commonly used as a disguise for this malware?

AThe malware is also disguised as software cracks for applications such as Microsoft Visio.

你可能也喜欢

TechFlow 情报局:特朗普关联公司在访华前转移 1200 万美元资产,大空头原型再次警告美股泡沫

近日科技与财经领域动态频出。AI安全成为焦点:Mozilla首次用AI进行大规模代码审查并发现大量漏洞,Google确认黑客已使用AI工具发现并利用零日漏洞发动攻击。同时,ChatGPT内容进入教科书引发争议,OpenAI使用未公开的GPT-5.5检查数学题目错误,Anthropic扫描并销毁百万实体书用于AI训练被法院裁定为“合理使用”。Google疑似泄露的新视频模型“Omni”在文字连贯性上表现突出。 加密市场方面,美国银行业试图阻止允许稳定币支付收益的法案条款但遭白宫拒绝,贝莱德选择以太坊作为代币化基金平台。值得注意的是,特朗普关联公司在其访华前转移了1200万美元加密资产。 芯片与硬件领域,台积电向美国工厂追加巨额投资,而随特朗普访华的科技领袖名单中未见英伟达CEO黄仁勋。 科技公司动态包括:GitLab裁员并放弃原有价值观,Meta被指控由扎克伯格授权使用盗版内容训练AI,欧盟拟立法限制美国云巨头处理政府敏感数据,微软因监控问题解雇以色列子公司负责人。 美股市场,《大空头》原型人物迈克尔·伯里再次警告美股泡沫风险,相关历史对比文章引发投资者热议。 其他要闻包括:国际油价因地缘紧张突破100美元,京沪高铁宣布涨价,以及宇树公司发布低价人形机器人。 贯穿各领域的暗线是,AI正从工具转变为基础设施,对旧秩序构成替代压力,而新秩序尚未成熟,导致市场出现普遍焦虑。

marsbit1小时前

TechFlow 情报局:特朗普关联公司在访华前转移 1200 万美元资产,大空头原型再次警告美股泡沫

marsbit1小时前

2026新政解读:智能体与AI终端的"双向奔赴",AIoT产业迎来三大价值重构

2026年5月8日,中国发布了两项重磅AIoT产业政策:一是《智能体规范应用与创新发展实施意见》,首次从国家层面定义了具备自主能力的智能体并列出19个典型应用场景;二是《人工智能终端智能化分级》国家标准,为七大品类终端建立了L1到L4的四级智能化阶梯。这两项政策构成“灵肉双轨”的顶层设计,标志着中国正将AIoT定义为“智能基础设施”。 政策的核心意义在于:将AI能力从模糊概念变为可衡量的工程指标;明确智能体为独立产品形态而非功能模块;通过起草单位揭示了未来产业链的关键竞争节点。这为产业提供了清晰的“能力地图”、“风险地图”和“方向地图”。 其中,L4协同级是未来最大变数,它将推动产业价值从“万物智联”(连接)转向“万物智行”(代理)。在C端,用户与设备关系将从操作工具变为委托代理;在B端,将从数据看板转向由多个智能体协同的自主执行。跨过L4的厂商将定义规则、占据价值中枢。 面对未来18-24个月的关键窗口期,AIoT企业需在三类赛道中选择:成为标准定义者、场景集成者或底座构建者。并可采用“四借”策略:借助L级国标获取背书与红利;借助19个典型场景进行深耕;借助开源生态降低成本或卡位;借助国内外协议生态抢占先机。 这组政策是未来十年产业竞速的发令枪,企业需明确自身定位,把握从“智联”到“智行”的范式转变机遇。

marsbit2小时前

2026新政解读:智能体与AI终端的"双向奔赴",AIoT产业迎来三大价值重构

marsbit2小时前

交易

现货
合约
活动图片