The post Steam Users Lost $150,000 From a Crypto Gaming Scam appeared on BitcoinEthereumNews.com. Online gaming storefront Steam unknowingly hosted crypto malware through one of its games. “Block Blasters,” the fake game in question, enabled at least $150,000 in token thefts. Steam removed this game after popular crypto sleuths amplified news of the hack. Still, the incident represents a major security breach for this venerable software platform. Steam Hosted Crypto Malware Part of the ongoing crypto crime wave has involved increasingly sophisticated malware operations, which use new vectors to steal tokens. Sponsored Sponsored Nonetheless, this newest scamming method is particularly unsettling. Steam is the gold standard for online gaming storefronts, and it directly hosted crypto malware: You clowns allow malware on your platform that has resulted in $150K+ stolen from victims (fake game has been available to download for more than a month) pic.twitter.com/886rO1PbDP — ZachXBT (@zachxbt) September 21, 2025 Specifically, Steam hosted sales of “Block Blasters,” a fake game containing dangerous malware. For over one month, this game was live, running secret executables that would target players’ wallets. In this way, it stole at least $150,000 in various cryptoassets, but the total theft quantity may be much higher. Cracking The Case ZachXBT, a famous crypto sleuth, didn’t necessarily spearhead this malware investigation, but he used his large platform to alert Steam. To its credit, the platform quickly removed the game after his notification. Nonetheless, it never should’ve survived on the storefront for several weeks. The investigators who unraveled this scheme uncovered several disturbing trends. First of all, the malware itself showed telltale fingerprints of AI-generated code, which allowed white hats to dissect it comprehensively. This may explain how they were able to confront the hackers directly. Essentially, this Steam crypto malware investigation began after a terminally ill cancer patient was defrauded of $32,000. The criminals showed zero remorse when confronted, claiming that the… The post Steam Users Lost $150,000 From a Crypto Gaming Scam appeared on BitcoinEthereumNews.com. Online gaming storefront Steam unknowingly hosted crypto malware through one of its games. “Block Blasters,” the fake game in question, enabled at least $150,000 in token thefts. Steam removed this game after popular crypto sleuths amplified news of the hack. Still, the incident represents a major security breach for this venerable software platform. Steam Hosted Crypto Malware Part of the ongoing crypto crime wave has involved increasingly sophisticated malware operations, which use new vectors to steal tokens. Sponsored Sponsored Nonetheless, this newest scamming method is particularly unsettling. Steam is the gold standard for online gaming storefronts, and it directly hosted crypto malware: You clowns allow malware on your platform that has resulted in $150K+ stolen from victims (fake game has been available to download for more than a month) pic.twitter.com/886rO1PbDP — ZachXBT (@zachxbt) September 21, 2025 Specifically, Steam hosted sales of “Block Blasters,” a fake game containing dangerous malware. For over one month, this game was live, running secret executables that would target players’ wallets. In this way, it stole at least $150,000 in various cryptoassets, but the total theft quantity may be much higher. Cracking The Case ZachXBT, a famous crypto sleuth, didn’t necessarily spearhead this malware investigation, but he used his large platform to alert Steam. To its credit, the platform quickly removed the game after his notification. Nonetheless, it never should’ve survived on the storefront for several weeks. The investigators who unraveled this scheme uncovered several disturbing trends. First of all, the malware itself showed telltale fingerprints of AI-generated code, which allowed white hats to dissect it comprehensively. This may explain how they were able to confront the hackers directly. Essentially, this Steam crypto malware investigation began after a terminally ill cancer patient was defrauded of $32,000. The criminals showed zero remorse when confronted, claiming that the…

Steam Users Lost $150,000 From a Crypto Gaming Scam

Online gaming storefront Steam unknowingly hosted crypto malware through one of its games. “Block Blasters,” the fake game in question, enabled at least $150,000 in token thefts.

Steam removed this game after popular crypto sleuths amplified news of the hack. Still, the incident represents a major security breach for this venerable software platform.

Steam Hosted Crypto Malware

Part of the ongoing crypto crime wave has involved increasingly sophisticated malware operations, which use new vectors to steal tokens.

Sponsored

Sponsored

Nonetheless, this newest scamming method is particularly unsettling. Steam is the gold standard for online gaming storefronts, and it directly hosted crypto malware:

Specifically, Steam hosted sales of “Block Blasters,” a fake game containing dangerous malware. For over one month, this game was live, running secret executables that would target players’ wallets.

In this way, it stole at least $150,000 in various cryptoassets, but the total theft quantity may be much higher.

Cracking The Case

ZachXBT, a famous crypto sleuth, didn’t necessarily spearhead this malware investigation, but he used his large platform to alert Steam. To its credit, the platform quickly removed the game after his notification. Nonetheless, it never should’ve survived on the storefront for several weeks.

The investigators who unraveled this scheme uncovered several disturbing trends. First of all, the malware itself showed telltale fingerprints of AI-generated code, which allowed white hats to dissect it comprehensively. This may explain how they were able to confront the hackers directly.

Essentially, this Steam crypto malware investigation began after a terminally ill cancer patient was defrauded of $32,000. The criminals showed zero remorse when confronted, claiming that the victim would “make it all back” as an active crypto trader.

This disturbing comment further incensed investigators to take apart the group.

These hackers evidently had little technical prowess, leaning on AI to make their software infrastructure and getting unmasked by community detectives. Still, their blatant malware managed to bypass all of Steam’s security protocols.

In other words, this is a major scandal, and Steam needs to take more proactive prevention measures in the future.

Source: https://beincrypto.com/steam-crypto-malware-game-theft/

Clause de non-responsabilité : les articles republiés sur ce site proviennent de plateformes publiques et sont fournis à titre informatif uniquement. Ils ne reflètent pas nécessairement les opinions de MEXC. Tous les droits restent la propriété des auteurs d'origine. Si vous estimez qu'un contenu porte atteinte aux droits d'un tiers, veuillez contacter service@support.mexc.com pour demander sa suppression. MEXC ne garantit ni l'exactitude, ni l'exhaustivité, ni l'actualité des contenus, et décline toute responsabilité quant aux actions entreprises sur la base des informations fournies. Ces contenus ne constituent pas des conseils financiers, juridiques ou professionnels, et ne doivent pas être interprétés comme une recommandation ou une approbation de la part de MEXC.
Partager des idées