Normal view
Google Chrome krijgt volgende week waarschijnlijk verticale tabbladbalk
Opera werkt aan Linux-versie van GX-browser voor gamers
Mozilla voegt 25 jaar na verzoek functie toe om sneltoetsen te personaliseren
Google voegt langverwachte ondersteuning JPEG XL toe aan Chrome
Kagi brengt alfaversie van Orion-browser voor Linux uit voor Orion+-abonnees
-
Kaspersky official blog

- The Stealka stealer hijacks accounts and steals crypto while masquerading as pirated software | Kaspersky official blog
The Stealka stealer hijacks accounts and steals crypto while masquerading as pirated software | Kaspersky official blog
In November 2025, Kaspersky experts uncovered a new stealer named Stealka, which targets Windows usersβ data. Attackers are using Stealka to hijack accounts, steal cryptocurrency, and install a crypto miner on their victimsβ devices. Most frequently, this infostealer disguises itself as game cracks, cheats and mods.
Hereβs how the attackers are spreading the stealer, and how you can protect yourself.
How Stealka spreads
A stealer is a type of malware that collects confidential information stored on the victimβs device and sends it to the attackersβ server. Stealka is primarily distributed via popular platforms like GitHub, SourceForge, Softpedia, sites.google.com, and others, disguised as cracks for popular software, or cheats and mods for games. For the malware to be activated, the user must run the file manually.
Hereβs an example: a malicious Roblox mod published on SourceForge.
And hereβs one on GitHub posing as a crack for Microsoft Visio.
Sometimes, however, attackers go a step further (and possibly use AI tools) to create entire fake websites that look quite professional. Without the help of a robust antivirus, the average user is unlikely to realize anything is amiss.
Admittedly, the cracks and software advertised on these fake sites can sometimes look a bitΒ off. For example, here the attackers are offering a download for Half-Life 3, while at the same time claiming itβs not actually a game but some kind of βprofessional software solution designed for Windowsβ.
Malware disguised as Half-Life 3, which is also somehow βa professional software solution designed for Windowsβ. A lot of professionals clearly spent their best years on this softwareβ¦
The truth is that both the page title and the filename are just bait. The attackers simply use popular search terms to lure users into downloading the malware. The actual file content has nothing to do with whatβs advertised β inside, itβs always the same infostealer.
The site also claimed that all hosted files were scanned for viruses. When the user decides to download, say, a pirated game, the site displays a banner saying the file is being scanned by various antivirus engines. Of course, no such scanning actually takes place; the attackers are merely trying to create an illusion of trustworthiness.
What makes Stealka dangerous
Stealka has a fairly extensive arsenal of capabilities, but its prime target is data from browsers built on the Chromium and Gecko engines. This puts over a hundred different browsers at risk, including popular ones like Chrome, Firefox, Opera, Yandex Browser, Edge, Brave, as well as many, many others.
Browsers store a huge amount of sensitive information, which attackers use to hijack accounts and continue their attacks. The main targets are autofill data, such as sign-in credentials, addresses, and payment card details. Weβve warned repeatedly that saving passwords in your browser is risky β attackers can extract them in seconds. Cookies and session tokens are perhaps even more valuable to hackers, as they can allow criminals to bypass two-factor authentication and hijack accounts without entering the password.
The story doesnβt end with the account hack. Attackers use these compromised accounts to spread the malware further. For example, we discovered the stealer in a GTAV mod posted on a dedicated site by an account that had previously been compromised.
Beyond stealing browser data, Stealka also targets the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA services. Here are some of the most popular extensions now at risk:
- Crypto wallets: Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Exodus
- Two-factor authentication: Authy, Google Authenticator, Bitwarden
- Password management: 1Password, Bitwarden, LastPass, KeePassXC, NordPass
Finally, the stealer also downloads local settings, account data, and service files from a wide variety of applications:
- Crypto wallets. Wallet configurations may contain encrypted private keys, seed-phrase data, wallet file paths, and encryption parameters. Thatβs enough to at least make an attempt at stealing your cryptocurrency. At risk are 80 wallet applications, including Binance, Bitcoin, BitcoinABC, Dogecoin, Ethereum, Exodus, Mincoin, MyCrypto, MyMonero, Monero, Nexus, Novacoin, Solar, and many others.
- Messaging apps. Messaging app service files store account data, device identifiers, authentication tokens, and the encryption parameters for your conversations. In theory, a malicious actor could gain access to your account and read your chats. At risk are Discord, Telegram, Unigram, Pidgin, Tox, and others.
- Password managers. Even if the passwords themselves are encrypted, the configuration files often contain information that makes cracking the vault significantly easier: encryption parameters, synchronization tokens, and details about the vault version and structure. At risk are 1Password, Authy, Bitwarden, KeePass, LastPass, and NordPass.
- Email clients. These are where your account credentials, mail server connection settings, authentication tokens, and local copies of your emails can be found. With access to your email, an attacker will almost certainly attempt to reset passwords for your other services. At risk are Gmail Notifier Pro, Claws, Mailbird, Outlook, Postbox, The Bat!, Thunderbird, and TrulyMail.
- Note-taking apps. Instead of shopping lists or late-night poetry, some users store information in their notes that has no business being there, like seed phrases or passwords. At risk are NoteFly, Notezilla, SimpleStickyNotes, and Microsoft StickyNotes.
- Gaming services and clients. The local files of gaming platforms and launchers store account data, linked service information, and authentication tokens. At risk are Steam, Roblox, Intent Launcher, Lunar Client, TLauncher, Feather Client, Meteor Client, Impact Client, Badlion Client, and WinAuth for battle.net.
- VPN clients. By gaining access to configuration files, attackers can hijack the victimβs VPN account to mask their own malicious activities. At risk are AzireVPN, OpenVPN, ProtonVPN, Surfshark, and WindscribeVPN.
Thatβs an extensive list β and we havenβt even named all of them! In addition to local files, this infostealer also harvests general system data: a list of installed programs, the OS version and language, username, computer hardware information, and miscellaneous settings. And as if that werenβt enough, the malware also takes screenshots.
How to protect yourself from Stealka and other infostealers
- Secure your device with reliable antivirus software. Even downloading files from legitimate websites is no guarantee of safety β attackers leverage trusted platforms to distribute stealers all the time. Kaspersky PremiumΒ detects malware on your computer in time and alerts you to the threat.
- Donβt store sensitive information in browsers. Itβs handy β no one can argue with that. But unfortunately browsers arenβt the most secure environment for your data. Sign-in credentials, bank card details, secret notes, and other confidential information are better kept in a securely encrypted format in Kaspersky Password Manager, which is immune to the exploits used by Stealka.
- Be careful with game cheats, mods, and especially pirated software. Itβs better to pay up for official software than to chase the false savings offered by software cracks, and end up losing all your money.
- Enable two-factor authentication or use backup codes wherever possible. Two-factor authentication (2FA) makes life much harder for attackers, while backup codes help you regain access to your critical accounts if compromised. Just be sure not to store backup codes in text documents, notes, or your browser. For all your backup codes and 2FA tokens, use a reliable password manager.
Curious what other stealers are out there, and what theyβre capable of? Read more in our other posts:




Browser Plugin Oversharing
Brian King // Β Do you know what that browser plugin is doing? Thereβs a browser plugin for just about everything. You can find one to change the name of [β¦]
The post Browser Plugin Oversharing appeared first on Black Hills Information Security, Inc..