• blockchain&beyond
  • news
  • 1 hour

Hackers Are Spreading Stealka Malware Through Game Mods and Cheats

This malicious software siphons passwords and private keys for crypto wallets from hundreds of applications and browser extensions.

0

nft.eu
  • rating +25
  • subscribers 112

Kaspersky Lab experts have identified the Stealka malware, which targets Windows users to steal their sensitive data. Beyond simple information theft, the software installs a hidden miner on devices to generate cryptocurrency for the attackers.

Infection Channels

Cybercriminals are hosting malicious files on platforms like GitHub, SourceForge, and Softpedia. The program requires users to manually run the file to activate the infection. Hackers disguise Stealka as Roblox scripts or cracked versions of Microsoft Visio.

To gain credibility, they create websites with fake banners that impersonate antivirus scan results. Ushkov explained that the names of these pages and files are merely tools to attract traffic and do not reflect the actual content. The software is frequently advertised as professional Windows solutions or highly anticipated game releases.

How the Infostealer Causes Harm

The program targets browsers built on Chromium and Gecko, including Chrome, Firefox, Brave, and Edge. The virus extracts saved passwords, addresses, payment details, and cookies.

Stolen cookies allow attackers to bypass two-factor authentication and hijack accounts without ever needing a password. Hackers then use these compromised social media profiles to spread the malicious code further through the victim's contact list.

The primary target for Stealka is a list of 115 browser extensions. This includes popular wallets like Binance, Coinbase, MetaMask, Trust Wallet, and Phantom. The virus copies wallet configuration files containing encrypted private keys and seed phrases. This data is sufficient for attackers to completely drain the victim's funds.

The infostealer also siphons data from messengers like Telegram and Discord, email clients, and VPN services. Hackers gain access to authentication tokens and chat histories. The program scans password managers as well as gaming platforms like Steam and software for Battle.net.

Additionally, the virus combs through personal notes for confidential information. Along with harvesting technical data about the computer’s configuration and operating system, the virus takes desktop screenshots and sends them to a command server. Furthermore, the software installs a hidden miner that puts excessive strain on the CPU and GPU, wearing down the hardware of the infected device.

Read also:

This post is for informational purposes only and does not constitute advertising or investment advice. Please do your own research before making any decisions.

0

Comments

0