Stealka Malware Explained: How Fake Game Mods And Software Cracks Are Draining Crypto Wallets

Bitcoin 2025-12-23 00:37

Stealka Malware Explained: How Fake Game Mods And Software Cracks Are Draining Crypto Wallets

A newly identified malware strain known as Stealka is stealing cryptocurrency by posing as game cheats, software cracks and popular mods, using trusted download platforms and fake websites to trick users into infecting their own devices.

Cybersecurity researchers at Kaspersky say the Windows-based infostealer has been actively circulating since at least November, targeting browser data, locally installed applications and both browser-based and desktop crypto wallets.

Once executed, Stealka is capable of hijacking online accounts, draining cryptocurrency holdings and, in some cases, installing a crypto miner to further monetize infected systems.

Spreads Through Game Cheats And Pirated Software

According to Kaspersky’s analysis, Stealka spreads primarily through files that users voluntarily download and run.

The malware is commonly disguised as cracked versions of commercial software or as cheats and mods for popular games, distributed through widely used platforms such as GitHub, SourceForge, Softpedia and Google Sites.

In several cases, attackers uploaded malicious files to legitimate repositories, relying on the platforms’ credibility to lower suspicion.

In parallel, researchers observed professionally designed fake websites offering pirated software or game scripts.

These sites often display false antivirus scan results to create the impression that downloads are safe.

In reality, the file names and page descriptions serve only as bait; the downloaded content consistently contains the same infostealer payload.

Malware Targets Browsers, Wallets And Local Applications

Once installed, Stealka focuses heavily on web browsers built on Chromium and Gecko, exposing users of more than a hundred browsers to data theft.

Also Read: ING Flags Deep Shift As China, India And Brazil Reduce Billions Of U.S. Treasury Holdings In A Single Month

The malware extracts saved login credentials, autofill data, cookies and session tokens, allowing attackers to bypass two-factor authentication and take over accounts without passwords.

Compromised accounts are then used to distribute the malware further, including through gaming communities.

Stealka also targets browser extensions tied to cryptocurrency wallets, password managers and authentication tools. Researchers identified attempts to harvest data from extensions linked to major crypto wallets such as MetaMask, Trust Wallet and Phantom, as well as password and authentication services including Bitwarden, Authy and Google Authenticator.

Beyond browsers, the malware collects configuration files and local data from dozens of desktop applications.

These include standalone crypto wallets that may store encrypted private keys and wallet metadata, messaging apps, email clients, VPN software, note-taking tools and gaming launchers.

Why It Matters

Access to this information enables attackers to steal funds, reset account credentials and conceal further malicious activity.

The malware additionally gathers system information and captures screenshots of infected devices.

Kaspersky warned that the Stealka campaign highlights the growing overlap between piracy, gaming-related downloads and financial cybercrime, urging users to avoid untrusted software sources and to treat cheats, mods and cracks as high-risk files.

Read Next: Bitcoin's Hidden Vulnerability Exposed: How Quantum Computers Could Steal Billions Before We're Ready

Share to:

This content is for informational purposes only and does not constitute investment advice.

Curated Series

SuperEx Popular Science Articles Column

SuperEx Popular Science Articles Column

This collection features informative articles about SuperEx, aiming to simplify complex cryptocurrency concepts for a wider audience. It covers the basics of trading, blockchain technology, and the features of the SuperEx platform. Through easy-to-understand content, it helps users navigate the world of digital assets with confidence and clarity.

Unstaked related news and market dynamics research

Unstaked related news and market dynamics research

Unstaked (UNSD) is a blockchain platform integrating AI agents for automated community engagement and social media interactions. Its native token supports governance, staking, and ecosystem features. This special feature explores Unstaked’s market updates, token dynamics, and platform development.

XRP News and Research

XRP News and Research

This series focuses on XRP, covering the latest news, market dynamics, and in-depth research. Featured analysis includes price trends, regulatory developments, and ecosystem growth, providing a clear overview of XRP's position and potential in the cryptocurrency market.

How do beginners trade options?How does option trading work?

How do beginners trade options?How does option trading work?

This special feature introduces the fundamentals of options trading for beginners, explaining how options work, their main types, and the mechanics behind trading them. It also explores key strategies, potential risks, and practical tips, helping readers build a clear foundation to approach the options market with confidence.

What are the risks of investing in cryptocurrency?

What are the risks of investing in cryptocurrency?

This special feature covers the risks of investing in cryptocurrency, explaining common challenges such as market volatility, security vulnerabilities, regulatory uncertainties, and potential scams. It also provides analysis of risk management strategies and mitigation techniques, helping readers gain a clear understanding of how to navigate the crypto market safely.