Kaspersky warns: Encrypted Trojan Stealka invades mainstream game mods, GTA5 and Roblox players are affected

👤 45ux@Uma 📅 2026-02-03 20:34:54

Stealka’s fund-stealing attack targets game communities, browser wallets and cryptographic libraries, exposing information security gaps in the Web3 era
(Previous summary: Chainalysis report: North Korean hackers stole US$2 billion in crypto assets in 2025, with Bybit becoming the biggest victim)
(Background supplement: Security company: North Korean hackers have penetrated 15~20% Cryptocurrency companies)

Contents of this article

On the eve of the Christmas holiday, it should have been a relaxing time to download games with special offers and update modules, but it was overshadowed by an information-stealing software called Stealka. According to Kaspersky’s detection in November, attackers packaged malicious programs into modules and cheating tools for popular games Roblox and GTA V, and uploaded them to mainstream platforms such as GitHub, SourceForge, and Google Sites. The moment the victim clicks to download, it is equivalent to handing over the key to the safe at home.

Trusting the platform has become the biggest vulnerability

The most difficult thing to prevent in this wave of actions is that it uses the "legal cloak" to weaken vigilance. Stealka is distributed through common open source websites and can be obtained without delving into the dark web. Kaspersky researcher Artem Ushkov said:

"The attackers most likely used AI tools to generate fake websites with extremely professional looks. These websites look impeccable enough to remove the last remaining doubts of the most wary users."

For teenage gamers or users eager to find cracked versions of office software, clicking on the link is almost a reflex action. Because of this, attackers were able to infiltrate tens of thousands of home computers in a short period of time.

Browser database: a vault locked by hackers

Unlike traditional destructive viruses, Stealka pursues "silent and complete" data harvesting. According to Kaspersky research, it supports capturing autofill forms, passwords and cookies for more than 100 Chromium and Gecko based browsers. To make things even more tricky, Stealka can read data from 115 browser extensions, including MetaMask, Binance, Coinbase wallets, and password managers such as 1Password. At the same time, it will scan more than 80 desktop encryption wallet programs such as Exodus and MyCrypto to directly steal private keys and mnemonic phrases. Once hackers obtain these credentials, user assets may be emptied within minutes.

Global proliferation outpaces defense deployment

Stealka is not an isolated case, but a microcosm of the escalation of information theft threats in 2025. Statistics show that from January to October this year, malware targeting game modules was detected a total of 384,000 times. Although the earliest affected areas were concentrated in Russia, it has recently spread to Germany, Brazil, India, Turkey and other places. The speed of cross-border transmission far exceeds the update frequency of most anti-virus solutions, creating a dilemma of "detecting lagging infections".

Zero trust becomes the last line of personal defense

The Stealka incident highlights the shift in responsibilities after the integration of Web3 and traditional finance: when users have asset sovereignty, they must also bear the risk of protecting private keys. Experts suggest that in addition to updating anti-virus software and browsers, the most critical thing is to develop a zero-trust download habit—even if the file comes from an official-looking open source platform, double-check the source and file hash value. For crypto wallet holders, moving large amounts of assets to cold wallets and avoiding installing wallet extensions in game browsers are pragmatic ways to reduce losses.

As the Trump administration has promoted friendly encryption policies since taking office, the market has become more popular, attracting more novices to participate, and also allowing hackers to see opportunities. Stealka reminds investors that the real risks are often hidden in the most everyday entertainment scenes. The next time you download a seemingly innocuous “free mod,” think about whether that file is worth risking your entire wallet on.

Label:
share:
FB X YT IG
45ux@Uma

45ux@Uma

Blockchain and cryptoassets editor, focusing onmarketDomain content analysis and insights

Comment (10)

Victor 29days ago
The author must have practical experience and his views are very solid.
Kyson 29days ago
Agree that technology implementation determines the future.
Giselle 29days ago
What are the main risks involved in PoS staking?
Heath 29days ago
The vision of Web3 requires such a solid construction.
Greer 29days ago
A good summary, blockchain is indeed iterating rapidly.
Reese 29days ago
The vision of Web3 requires such a solid construction.
Wayne 35days ago
The views are solid and worthy of long-term attention.
Lily 35days ago
In the future, blockchain will be more integrated with AI/IoT and other technologies.
Clouds 42days ago
A deflationary model may not be conducive to intraecological circulation.
Ruby 46days ago
The perspective of the article is very Web3, and I support continued sharing.

Add comment

Popular content