Close Menu
    What's Hot

    Binance Hits 300M Registered Accounts 8 Years After Launch – Key Drivers Behind the Growth

    SolanaFloor app launches on Solana Mobile’s dApp store

    US Lawmakers Push IRS to Fix Crypto Staking Tax Before 2026

    Facebook X (Twitter) Instagram
    Monday, December 22
    • About us
    • Contact us
    • Privacy Policy
    • Contact
    Facebook X (Twitter) Instagram
    kryptodaily.com
    • Home
    • Crypto News
      • Altcoin
      • Ethereum
      • NFT
    • Learn Crypto
      • Bitcoin
      • Blockchain
    • Live Chart
    • About Us
    • Contact
    kryptodaily.com
    Home»Ethereum»Stealka Malware Targets Crypto Wallets Via Game Mods
    Ethereum

    Stealka Malware Targets Crypto Wallets Via Game Mods

    KryptonewsBy KryptonewsDecember 22, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    New malware has been discovered that targets crypto wallets and browser extensions while disguising itself as game cheats and mods, says cybersecurity firm Kaspersky.

    Kaspersky reported on Thursday that it had uncovered a new infostealer dubbed “Stealka,” which targets Microsoft Windows user data.

    Attackers have used the malware, which was discovered in November, to hijack accounts, steal cryptocurrency, and install crypto miners on their victims’ computers while masquerading as video game cracks, cheats, and mods.

    The malicious software has been distributed through legitimate platforms like GitHub, SourceForge, and Google Sites, and disguised as game mods, especially for Roblox, and software cracks for applications such as Microsoft Visio. 

    Sometimes, attackers go a step further, possibly using artificial intelligence tools, and creating entire fake websites that look “quite professional,” said Kaspersky researcher Artem Ushkov.

    A fake website pretending to offer Roblox scripts, Source: Kaspersky

    Crypto wallets and extensions targeted 

    Ushkov noted that Stealka has a fairly “extensive arsenal of capabilities,” but is particularly dangerous because its prime target is data from browsers built on the Chromium and Gecko engines. 

    This puts over 100 different browsers at risk, including popular ones such as Chrome, Firefox, Opera, Yandex, Edge, Brave, and many others.

    Related: Hackers are exploiting a JavaScript library to plant crypto drainers

    Its primary targets are autofill data, such as sign-in credentials, addresses, and payment card details, but it also targets the settings and databases of 115 browser extensions for crypto wallets, password managers, and 2FA (two-factor authentication) services. 

    Some of the 80 crypto wallets targeted include Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Nexus, and Exodus. 

    Kaspersky also said the messaging apps, including  Discord, Telegram, Unigram, Pidgin, and Tox, were also at risk, as were email clients, password managers, gaming clients, and even VPN applications. 

    Avoid pirated software and game mods

    To stay protected, Kaspersky recommended using reliable antivirus software and password managers to avoid storing passwords in browsers. It also cautioned against using pirated software and unofficial game mods.