Normal view
Meta sluit drie VR-studio's als onderdeel van ontslagronde metaverseafdeling
Rechtbank: Epic Games zette kinderen oneerlijk aan tot aankopen in Fortnite
Minecraftachtige game Hytale is eindelijk uit in early access
ARC Raiders is ruim 12 miljoen keer verkocht
Fable-bedenker Peter Molyneux brengt Masters of Albion in april uit
Palworld krijgt competitief kaartspel voor twee spelers
Sidescrollingactiegame Towerborne wordt toch niet gratis en komt in februari uit
Voormalige Xbox-exclusive Avowed komt 17 februari naar PlayStation 5
Nintendo vraagt 70 of 80 euro voor Mario Tennis Fever bij release op 12 februari
-
Kaspersky official blog

- The Stealka stealer hijacks accounts and steals crypto while masquerading as pirated software | Kaspersky official blog
The Stealka stealer hijacks accounts and steals crypto while masquerading as pirated software | Kaspersky official blog
In November 2025, Kaspersky experts uncovered a new stealer named Stealka, which targets Windows usersβ data. Attackers are using Stealka to hijack accounts, steal cryptocurrency, and install a crypto miner on their victimsβ devices. Most frequently, this infostealer disguises itself as game cracks, cheats and mods.
Hereβs how the attackers are spreading the stealer, and how you can protect yourself.
How Stealka spreads
A stealer is a type of malware that collects confidential information stored on the victimβs device and sends it to the attackersβ server. Stealka is primarily distributed via popular platforms like GitHub, SourceForge, Softpedia, sites.google.com, and others, disguised as cracks for popular software, or cheats and mods for games. For the malware to be activated, the user must run the file manually.
Hereβs an example: a malicious Roblox mod published on SourceForge.
And hereβs one on GitHub posing as a crack for Microsoft Visio.
Sometimes, however, attackers go a step further (and possibly use AI tools) to create entire fake websites that look quite professional. Without the help of a robust antivirus, the average user is unlikely to realize anything is amiss.
Admittedly, the cracks and software advertised on these fake sites can sometimes look a bitΒ off. For example, here the attackers are offering a download for Half-Life 3, while at the same time claiming itβs not actually a game but some kind of βprofessional software solution designed for Windowsβ.
Malware disguised as Half-Life 3, which is also somehow βa professional software solution designed for Windowsβ. A lot of professionals clearly spent their best years on this softwareβ¦
The truth is that both the page title and the filename are just bait. The attackers simply use popular search terms to lure users into downloading the malware. The actual file content has nothing to do with whatβs advertised β inside, itβs always the same infostealer.
The site also claimed that all hosted files were scanned for viruses. When the user decides to download, say, a pirated game, the site displays a banner saying the file is being scanned by various antivirus engines. Of course, no such scanning actually takes place; the attackers are merely trying to create an illusion of trustworthiness.
What makes Stealka dangerous
Stealka has a fairly extensive arsenal of capabilities, but its prime target is data from browsers built on the Chromium and Gecko engines. This puts over a hundred different browsers at risk, including popular ones like Chrome, Firefox, Opera, Yandex Browser, Edge, Brave, as well as many, many others.
Browsers store a huge amount of sensitive information, which attackers use to hijack accounts and continue their attacks. The main targets are autofill data, such as sign-in credentials, addresses, and payment card details. Weβve warned repeatedly that saving passwords in your browser is risky β attackers can extract them in seconds. Cookies and session tokens are perhaps even more valuable to hackers, as they can allow criminals to bypass two-factor authentication and hijack accounts without entering the password.
The story doesnβt end with the account hack. Attackers use these compromised accounts to spread the malware further. For example, we discovered the stealer in a GTAV mod posted on a dedicated site by an account that had previously been compromised.
Beyond stealing browser data, Stealka also targets the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA services. Here are some of the most popular extensions now at risk:
- Crypto wallets: Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Exodus
- Two-factor authentication: Authy, Google Authenticator, Bitwarden
- Password management: 1Password, Bitwarden, LastPass, KeePassXC, NordPass
Finally, the stealer also downloads local settings, account data, and service files from a wide variety of applications:
- Crypto wallets. Wallet configurations may contain encrypted private keys, seed-phrase data, wallet file paths, and encryption parameters. Thatβs enough to at least make an attempt at stealing your cryptocurrency. At risk are 80 wallet applications, including Binance, Bitcoin, BitcoinABC, Dogecoin, Ethereum, Exodus, Mincoin, MyCrypto, MyMonero, Monero, Nexus, Novacoin, Solar, and many others.
- Messaging apps. Messaging app service files store account data, device identifiers, authentication tokens, and the encryption parameters for your conversations. In theory, a malicious actor could gain access to your account and read your chats. At risk are Discord, Telegram, Unigram, Pidgin, Tox, and others.
- Password managers. Even if the passwords themselves are encrypted, the configuration files often contain information that makes cracking the vault significantly easier: encryption parameters, synchronization tokens, and details about the vault version and structure. At risk are 1Password, Authy, Bitwarden, KeePass, LastPass, and NordPass.
- Email clients. These are where your account credentials, mail server connection settings, authentication tokens, and local copies of your emails can be found. With access to your email, an attacker will almost certainly attempt to reset passwords for your other services. At risk are Gmail Notifier Pro, Claws, Mailbird, Outlook, Postbox, The Bat!, Thunderbird, and TrulyMail.
- Note-taking apps. Instead of shopping lists or late-night poetry, some users store information in their notes that has no business being there, like seed phrases or passwords. At risk are NoteFly, Notezilla, SimpleStickyNotes, and Microsoft StickyNotes.
- Gaming services and clients. The local files of gaming platforms and launchers store account data, linked service information, and authentication tokens. At risk are Steam, Roblox, Intent Launcher, Lunar Client, TLauncher, Feather Client, Meteor Client, Impact Client, Badlion Client, and WinAuth for battle.net.
- VPN clients. By gaining access to configuration files, attackers can hijack the victimβs VPN account to mask their own malicious activities. At risk are AzireVPN, OpenVPN, ProtonVPN, Surfshark, and WindscribeVPN.
Thatβs an extensive list β and we havenβt even named all of them! In addition to local files, this infostealer also harvests general system data: a list of installed programs, the OS version and language, username, computer hardware information, and miscellaneous settings. And as if that werenβt enough, the malware also takes screenshots.
How to protect yourself from Stealka and other infostealers
- Secure your device with reliable antivirus software. Even downloading files from legitimate websites is no guarantee of safety β attackers leverage trusted platforms to distribute stealers all the time. Kaspersky PremiumΒ detects malware on your computer in time and alerts you to the threat.
- Donβt store sensitive information in browsers. Itβs handy β no one can argue with that. But unfortunately browsers arenβt the most secure environment for your data. Sign-in credentials, bank card details, secret notes, and other confidential information are better kept in a securely encrypted format in Kaspersky Password Manager, which is immune to the exploits used by Stealka.
- Be careful with game cheats, mods, and especially pirated software. Itβs better to pay up for official software than to chase the false savings offered by software cracks, and end up losing all your money.
- Enable two-factor authentication or use backup codes wherever possible. Two-factor authentication (2FA) makes life much harder for attackers, while backup codes help you regain access to your critical accounts if compromised. Just be sure not to store backup codes in text documents, notes, or your browser. For all your backup codes and 2FA tokens, use a reliable password manager.
Curious what other stealers are out there, and what theyβre capable of? Read more in our other posts:




-
Black Hills Information Security, Inc.

- Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs
Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs
![]()
| Bronwen Aker // Sr. Technical Editor, M.S. Cybersecurity, GSEC, GCIH, GCFE Go online these days and you will see tons of articles, posts, Tweets, TikToks, and videos about how [β¦]
The post Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs appeared first on Black Hills Information Security, Inc..
Join Us for Camp BHIS @ DEF CON 31Β
Hey, Campers! Itβs that time of year again. The smell of 0-day in the air. Charlatans roasting by the pyre. Old friends and new gather in one of the worst [β¦]
The post Join Us for Camp BHIS @ DEF CON 31Β appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.
- How to Play Competitive Backdoors & Breaches w/ Jason Blanchard (1-Hour)
How to Play Competitive Backdoors & Breaches w/ Jason Blanchard (1-Hour)
The post How to Play Competitive Backdoors & Breaches w/ Jason Blanchard (1-Hour) appeared first on Black Hills Information Security, Inc..
POGS at Wild West Hackinβ Fest!Β
![]()
Ean Meyer // This post is for attendees of Wild West Hackinβ Fest: Deadwood 2022 POGs? Yes, POGs! If you arenβt familiar with POGs, this game started decades ago, reaching [β¦]
The post POGS at Wild West Hackinβ Fest!Β appeared first on Black Hills Information Security, Inc..
Talkinβ About Infosec News β 10/5/2022
02:28 β Story # 1: American Airlines Breach Exposes Customer and Staff InformationβΒ https://www.infosecurity-magazine.com/news/american-airlines-breach-customer/18:59 β Story # 2: London police arrest, charge teen hacking suspect but wonβt confirm GTA 6, Uber [β¦]
The post Talkinβ About Infosec News β 10/5/2022 appeared first on Black Hills Information Security, Inc..
So You Want to Build a Conference Hardware Badge!
![]()
Ray Felch // Recently, it was suggested that it would be cool to create a hardware badge for one of the upcoming InfoSec conferences. Admittedly, I have a pretty solid [β¦]
The post So You Want to Build a Conference Hardware Badge! appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.
- How to Use Backdoors & Breaches to do Tabletop Exercises and Learn Cybersecurity
How to Use Backdoors & Breaches to do Tabletop Exercises and Learn Cybersecurity
Have you heard of Backdoors & Breaches, or even have a deck of your own, and yetβ¦ still donβt know how to use it? We created an incident response card [β¦]
The post How to Use Backdoors & Breaches to do Tabletop Exercises and Learn Cybersecurity appeared first on Black Hills Information Security, Inc..
Webcast: How to Share Your Knowledge with Others
![]()
Have you ever seen a call for papers for a conference and thought to yourself that youβd like to submit a talk and then immediately thought, oh never mind? Have [β¦]
The post Webcast: How to Share Your Knowledge with Others appeared first on Black Hills Information Security, Inc..
The Birth of PreShowBanterCon-A-Thon 2021!β’
Join the BHIS Community Discord: https://discord.gg/bhis Music By Beau: https://www.nobandwidth.io 00:00 β 2021-04-01 β PreShow Banterβ’ β Intro Sec Con & The Birth of PreShowBanterCon-A-Thon 2021!β’ 05:29 β Youβre So [β¦]
The post The Birth of PreShowBanterCon-A-Thon 2021!β’ appeared first on Black Hills Information Security, Inc..


