Video Game Mods Are Spreading New ‘Stealka’ Crypto Infostealer: Kaspersky

Video Game Mods Are Spreading New ‘Stealka’ Crypto Infostealer: Kaspersky

Cointelegraph
CointelegraphDec 22, 2025

Why It Matters

Stealka threatens the rapidly growing crypto‑user base by compromising high‑value wallet credentials, potentially fueling large‑scale theft. Its use of trusted platforms makes detection harder, raising the overall risk landscape for gamers and crypto investors alike.

Key Takeaways

  • Stealka masquerades as game mods and software cracks
  • Targets Chromium and Gecko browsers, 115 extensions
  • Steals credentials from major crypto wallets
  • Distributed via GitHub, SourceForge, Google Sites
  • Avoid pirated mods; use reputable security tools

Pulse Analysis

The emergence of Stealka highlights a troubling shift in cyber‑crime tactics, where attackers leverage popular gaming culture to distribute malware. By hosting the malicious payload on reputable code‑sharing services and crafting professional‑looking fake sites—sometimes with AI assistance—criminals bypass traditional security filters. This approach not only broadens their reach but also exploits the trust gamers place in community‑driven mod repositories, turning a hobby into a vector for financial crime.

Stealka’s primary focus on Chromium and Gecko browsers gives it access to a massive user base, as these engines power browsers like Chrome, Edge, Firefox, Brave and many niche alternatives. Once installed, the infostealer extracts autofill data, login credentials, and the configuration files of over 115 crypto‑wallet extensions, including Binance, Coinbase, MetaMask and Trust Wallet. By compromising both the browser and its extensions, the malware can silently siphon funds, hijack two‑factor authentication, and even install cryptominers, amplifying the financial impact on victims.

Mitigation requires a layered defense strategy. Users should steer clear of pirated software and unofficial game mods, opting for official distribution channels instead. Deploying reputable antivirus solutions, enabling browser‑level password managers, and regularly reviewing extension permissions can curb exposure. For organizations, monitoring traffic to known code‑hosting platforms and employing threat‑intelligence feeds can help detect anomalous downloads. As crypto adoption accelerates, the convergence of gaming and finance will likely attract more sophisticated threats, making proactive security hygiene essential for both individuals and enterprises.

Video game mods are spreading new ‘Stealka’ crypto infostealer: Kaspersky

Comments

Want to join the conversation?

Loading comments...