{"id":35895,"date":"2020-06-16T06:17:41","date_gmt":"2020-06-16T10:17:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=35895"},"modified":"2021-05-31T07:54:11","modified_gmt":"2021-05-31T11:54:11","slug":"gaming-password-stealers","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/gaming-password-stealers\/35895\/","title":{"rendered":"How Trojans steal gaming accounts"},"content":{"rendered":"<p>We often talk about the online threats gamers face, including malware in pirated copies, mods, and cheats, not to mention phishing and <a href=\"https:\/\/www.kaspersky.com\/blog\/steam-scam\/11317\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">all kinds of scams<\/a> when buying or exchanging in-game items. And not long ago, we looked at problems with <a href=\"https:\/\/www.kaspersky.com\/blog\/whats-wrong-with-cheap-game-keys\/35682\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">buying accounts<\/a>. Fortunately, it\u2019s easy to avoid those threats if you know about them.<\/p>\n<p>But here\u2019s another problem you need to know about and defend against: password stealers. When our security solutions catch them, they\u2019re usually designated Trojan-PSW.(something). They are Trojans designed to steal accounts\u00a0\u2014 either username\/password combinations or session tokens.<\/p>\n<p>You may have read about <a href=\"https:\/\/www.kaspersky.com\/blog\/stealing-steam-accounts\/11560\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Steam stealers<\/a>\u00a0\u2014 Trojans that steal accounts in the world\u2019s most popular gaming service. But there are many other platforms out there, such as Battle.net, Origin, Uplay, and the Epic Games Store. They all have multimillion-dollar audiences, so naturally, attackers are interested, and stealers exist for them, too.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kts-dm-gamers\">\n<h2>What are password stealers?<\/h2>\n<p>Password stealers are a type of malware that steals account information. In essence, it is similar to a banking Trojan, but instead of intercepting or substituting entered data, it usually steals information already stored on the computer: usernames and passwords <a href=\"https:\/\/www.kaspersky.com\/blog\/browser-data-theft\/27871\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">saved in the browser<\/a>, cookies, and other files that happen to be on the hard drive of the infected device. Moreover, sometimes game accounts are just one of the targets of stealers\u00a0\u2014 some are no less interested in your online banking credentials.<\/p>\n<p>Stealers can grab accounts in many ways. For example, take Trojan stealer Kpot (aka Trojan-PSW.Win32.Kpot). It is distributed mainly through e-mail spam with attachments that use vulnerabilities (for example, in Microsoft Office) to download the actual malware onto the computer.<\/p>\n<p>Next, the stealer transfers information about programs installed on the computer to the command-and-control server and waits for commands to proceed. Among the possible commands are ones to steal cookies, Telegram and Skype accounts, and much more.<\/p>\n<p>What\u2019s more, it can steal files with the .config extension from the %APPDATA%\\Battle.net folder, which, as you might guess, is linked to Battle.net, Blizzard\u2019s own game-launcher app. Among other things, these files contain the player\u2019s session token\u00a0\u2014 that is, the cybercriminals don\u2019t get the actual username and password, but they can use the token to pretend to be the user.<\/p>\n<p>Why do that? Simple: They can quickly sell off all the victim\u2019s in-game items, sometimes making good money. This is a feasible scenario in various Blizzard titles, including <em>World of Warcraft<\/em> and <em>Diablo 3<\/em>.<\/p>\n<p>Other malware, which targets Uplay, Ubisoft\u2019s game launcher app, goes by the name Okasidis, and our solutions call it Trojan-Banker.MSIL.Evital.gen. With respect to gaming accounts, it behaves exactly like the Kpot Trojan except that it steals two specific files: %LOCALAPPDATA%\\Ubisoft Game Launcher\\users.dat and %LOCALAPPDATA%\\Ubisoft Game Launcher\\settings.yml.<\/p>\n<p>Uplay is also of interest to a piece of malware named Thief Stealer (detected as HEUR:Trojan.Win32.Generic), which scoops up all files from the %LOCALAPPDATA%\\Ubisoft Game Launcher\\ folder.<\/p>\n<p>In addition, Uplay, Origin, and Battle.net are all targets for the BetaBot malware (detected as Trojan.Win32.Neurevt). But this Trojan has a different mode of operation. If the user visits a URL containing certain keywords (any addresses with the words \u201cuplay\u201d or \u201corigin,\u201d for example), the malware enables data collection from forms on these pages. That is, account usernames and passwords entered on the pages go straight to the attackers.<\/p>\n<p>In all three cases, the user is unlikely to notice anything\u00a0\u2014 the Trojan doesn\u2019t reveal itself in any way on the computer, doesn\u2019t display any windows with requests, but simply steals files and\/or data on the sly.<\/p>\n<h2>How to guard against Trojans hungry for gaming accounts<\/h2>\n<p>In principle, gaming accounts need to be protected in much the same way as everything else, including against stealers. Follow the advice below to foil Trojan thieves:<\/p>\n<ul>\n<li>Protect your account with two-factor authentication. Steam has Steam Guard, Battle.net has Blizzard Authenticator, and the Epic Games Store offers a choice between an <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">authenticator app<\/a> and authentication by text or e-mail. If your account is protected by two-factor authentication, then cybercriminals will need more than a username and a password to get inside it.<\/li>\n<li>Do not download mods from suspicious sites, or pirated software. Attackers are well aware of people\u2019s craving for all things free, and they exploit it through malware hidden in cracks, cheats, and mods.<\/li>\n<li>Use a reliable security solution. For example, <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Cloud<\/a> catches all these stealers and stops them from pinching anything.<\/li>\n<li>Do not turn off your antivirus when playing. If you do, a password stealer may suddenly spring into action. <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Cloud<\/a>\u2018s gaming mode prevents the antivirus from consuming too many system resources during a game. It has no impact on performance or frame rate but still takes care of security.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kts-dm-gamers\">\n","protected":false},"excerpt":{"rendered":"<p>A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.<\/p>\n","protected":false},"author":2555,"featured_media":35896,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[647,3244,164,422,723],"class_list":{"0":"post-35895","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-gamers","9":"tag-stealers","10":"tag-steam","11":"tag-threats","12":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gaming-password-stealers\/35895\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gaming-password-stealers\/21463\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gaming-password-stealers\/16932\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/gaming-password-stealers\/8355\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gaming-password-stealers\/22621\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gaming-password-stealers\/20743\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/gaming-password-stealers\/19098\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/gaming-password-stealers\/22972\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/gaming-password-stealers\/21976\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/gaming-password-stealers\/28605\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/gaming-password-stealers\/8475\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/gaming-password-stealers\/15127\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/gaming-password-stealers\/15622\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/gaming-password-stealers\/13605\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/gaming-password-stealers\/24282\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/gaming-password-stealers\/11612\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gaming-password-stealers\/28674\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/gaming-password-stealers\/25573\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/gaming-password-stealers\/22502\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gaming-password-stealers\/27746\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gaming-password-stealers\/27587\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2555"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=35895"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35895\/revisions"}],"predecessor-version":[{"id":40110,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35895\/revisions\/40110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35896"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=35895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=35895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}