{"id":55058,"date":"2025-12-18T08:34:48","date_gmt":"2025-12-18T13:34:48","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=55058"},"modified":"2025-12-18T08:34:48","modified_gmt":"2025-12-18T13:34:48","slug":"windows-stealer-stealka","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/windows-stealer-stealka\/55058\/","title":{"rendered":"Stealka stealer: the new face of game cheats, mods, and cracks"},"content":{"rendered":"<p>In November 2025, Kaspersky experts uncovered a new stealer named Stealka, which targets Windows users\u2019 data. Attackers are using Stealka to hijack accounts, steal cryptocurrency, and install a crypto miner on their victims\u2019 devices. Most frequently, this infostealer disguises itself as game cracks, cheats and mods.<\/p>\n<p>Here\u2019s how the attackers are spreading the stealer, and how you can protect yourself.<\/p>\n<h2>How Stealka spreads<\/h2>\n<p>A stealer is a type of malware that collects confidential information stored on the victim\u2019s device and sends it to the attackers\u2019 server. Stealka is primarily distributed via popular platforms like GitHub, SourceForge, Softpedia, sites.google.com, and others, disguised as cracks for popular software, or cheats and mods for games. For the malware to be activated, the user must run the file manually.<\/p>\n<p>Here\u2019s an example: a malicious Roblox mod published on SourceForge.<\/p>\n<div id=\"attachment_55061\" style=\"width: 1097px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082629\/windows-stealer-stealka-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-55061\" class=\"size-full wp-image-55061\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082629\/windows-stealer-stealka-1.png\" alt=\"Attackers exploited SourceForge, a legitimate website, to upload a mod containing Stealka \" width=\"1087\" height=\"1168\"><\/a><p id=\"caption-attachment-55061\" class=\"wp-caption-text\">Attackers exploited SourceForge, a legitimate website, to upload a mod containing Stealka<\/p><\/div>\n<p>And here\u2019s one on GitHub posing as a crack for Microsoft Visio.<\/p>\n<div id=\"attachment_55063\" style=\"width: 868px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082716\/windows-stealer-stealka-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-55063\" class=\"size-full wp-image-55063\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082716\/windows-stealer-stealka-2.jpg\" alt=\"A pirated version of Microsoft Visio containing the stealer, hosted on GitHub\" width=\"858\" height=\"1205\"><\/a><p id=\"caption-attachment-55063\" class=\"wp-caption-text\">A pirated version of Microsoft Visio containing the stealer, hosted on GitHub<\/p><\/div>\n<p>Sometimes, however, attackers go a step further (and possibly use AI tools) to create entire fake websites that look quite professional. Without the help of a robust <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">antivirus<\/a>, the average user is unlikely to realize anything is amiss.<\/p>\n<div id=\"attachment_55064\" style=\"width: 1369px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082846\/windows-stealer-stealka-3.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-55064\" class=\"size-full wp-image-55064\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082846\/windows-stealer-stealka-3.jpg\" alt=\"A fake website pretending to offer Roblox scripts \" width=\"1359\" height=\"977\"><\/a><p id=\"caption-attachment-55064\" class=\"wp-caption-text\">A fake website pretending to offer Roblox scripts<\/p><\/div>\n<p>Admittedly, the cracks and software advertised on these fake sites can sometimes look a bit\u00a0off. For example, here the attackers are offering a download for Half-Life 3, while at the same time claiming it\u2019s not actually a game but some kind of \u201cprofessional software solution designed for Windows\u201d.<\/p>\n<div id=\"attachment_55065\" style=\"width: 1200px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082933\/windows-stealer-stealka-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-55065\" class=\"size-full wp-image-55065\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18082933\/windows-stealer-stealka-4.jpg\" alt=\"Malware disguised as Half-Life 3 \" width=\"1190\" height=\"1056\"><\/a><p id=\"caption-attachment-55065\" class=\"wp-caption-text\">Malware disguised as Half-Life 3, which is also somehow \u201ca professional software solution designed for Windows\u201d. A lot of professionals clearly spent their best years on this software\u2026<\/p><\/div>\n<p>The truth is that both the page title and the filename are just bait. The attackers simply use popular search terms to lure users into downloading the malware. The actual file content has nothing to do with what\u2019s advertised \u2014 inside, it\u2019s always the same infostealer.<\/p>\n<p>The site also claimed that all hosted files were scanned for viruses. When the user decides to download, say, a pirated game, the site displays a banner saying the file is being scanned by various antivirus engines. Of course, no such scanning actually takes place; the attackers are merely trying to create an illusion of trustworthiness.<\/p>\n<div id=\"attachment_55066\" style=\"width: 952px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18083024\/windows-stealer-stealka-5.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-55066\" class=\"size-full wp-image-55066\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/18083024\/windows-stealer-stealka-5.jpg\" alt=\"The pirated file pretends to be scanned by a dozen antivirus tools \" width=\"942\" height=\"1007\"><\/a><p id=\"caption-attachment-55066\" class=\"wp-caption-text\">The pirated file pretends to be scanned by a dozen antivirus tools<\/p><\/div>\n<h2>What makes Stealka dangerous<\/h2>\n<p>Stealka has a fairly extensive arsenal of capabilities, but its prime target is data from browsers built on the <strong>Chromium and Gecko engines<\/strong>. This puts <strong>over a hundred<\/strong> different browsers at risk, including popular ones like Chrome, Firefox, Opera, Yandex Browser, Edge, Brave, as well as many, many others.<\/p>\n<p>Browsers store a huge amount of sensitive information, which attackers use to hijack accounts and continue their attacks. The main targets are autofill data, such as sign-in credentials, addresses, and payment card details. We\u2019ve warned repeatedly that saving passwords in your browser is risky \u2014 attackers <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/48784\/\" target=\"_blank\" rel=\"noopener nofollow\">can extract them in seconds<\/a>. <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">Cookies and session tokens<\/a> are perhaps even more valuable to hackers, as they can allow criminals to bypass two-factor authentication <a href=\"https:\/\/www.kaspersky.com\/blog\/youtubers-takeovers\/48375\/\" target=\"_blank\" rel=\"noopener nofollow\">and hijack accounts without entering the password<\/a>.<\/p>\n<p>The story doesn\u2019t end with the account hack. Attackers use these compromised accounts to spread the malware further. For example, we discovered the stealer in a GTAV mod posted on a dedicated site by an account that had previously been compromised.<\/p>\n<p>Beyond stealing browser data, Stealka also targets the settings and databases of <strong>115<\/strong> <strong>browser extensions<\/strong> for crypto wallets, password managers, and 2FA services. Here are some of the most popular extensions now at risk:<\/p>\n<ul>\n<li><strong>Crypto wallets: <\/strong>Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Exodus<\/li>\n<li><strong>Two-factor authentication: <\/strong>Authy, Google Authenticator, Bitwarden<\/li>\n<li><strong>Password management: <\/strong>1Password, Bitwarden, LastPass, KeePassXC, NordPass<\/li>\n<\/ul>\n<p>Finally, the stealer also downloads local settings, account data, and service files from a wide variety of applications:<\/p>\n<ul>\n<li><strong>Crypto wallets<\/strong>. Wallet configurations may contain encrypted private keys, seed-phrase data, wallet file paths, and encryption parameters. That\u2019s enough to at least make an attempt at stealing your cryptocurrency. <strong>At risk<\/strong> are 80 wallet applications, including Binance, Bitcoin, BitcoinABC, Dogecoin, Ethereum, Exodus, Mincoin, MyCrypto, MyMonero, Monero, Nexus, Novacoin, Solar, and many others.<\/li>\n<li><strong>Messaging apps<\/strong>. Messaging app service files store account data, device identifiers, authentication tokens, and the encryption parameters for your conversations. In theory, a malicious actor could gain access to your account and read your chats. <strong>At risk<\/strong> are Discord, Telegram, Unigram, Pidgin, Tox, and others.<\/li>\n<li><strong>Password managers<\/strong>. Even if the passwords themselves are encrypted, the configuration files often contain information that makes cracking the vault significantly easier: encryption parameters, synchronization tokens, and details about the vault version and structure. <strong>At risk<\/strong> are 1Password, Authy, Bitwarden, KeePass, LastPass, and NordPass.<\/li>\n<li><strong>Email clients<\/strong>. These are where your account credentials, mail server connection settings, authentication tokens, and local copies of your emails can be found. With access to your email, an attacker will almost certainly attempt to reset passwords for your other services. <strong>At risk<\/strong> are Gmail Notifier Pro, Claws, Mailbird, Outlook, Postbox, The Bat!, Thunderbird, and TrulyMail.<\/li>\n<li><strong>Note-taking apps<\/strong>. Instead of shopping lists or late-night poetry, some users store information in their notes that has no business being there, like seed phrases or passwords. <strong>At risk<\/strong> are NoteFly, Notezilla, SimpleStickyNotes, and Microsoft StickyNotes.<\/li>\n<li><strong>Gaming services and clients<\/strong>. The local files of gaming platforms and launchers store account data, linked service information, and authentication tokens. <strong>At risk<\/strong> are Steam, Roblox, Intent Launcher, Lunar Client, TLauncher, Feather Client, Meteor Client, Impact Client, Badlion Client, and WinAuth for battle.net.<\/li>\n<li><strong>VPN clients. <\/strong>By gaining access to configuration files, attackers can hijack the victim\u2019s VPN account to mask their own malicious activities. <strong>At risk<\/strong> are AzireVPN, OpenVPN, ProtonVPN, Surfshark, and WindscribeVPN.<\/li>\n<\/ul>\n<p>That\u2019s an extensive list \u2014 and we haven\u2019t even named all of them! In addition to local files, this infostealer also harvests general system data: a list of installed programs, the OS version and language, username, computer hardware information, and miscellaneous settings. And as if that weren\u2019t enough, the malware also takes screenshots.<\/p>\n<h2>How to protect yourself from Stealka and other infostealers<\/h2>\n<ul>\n<li><strong>Secure your device with reliable antivirus software<\/strong>. Even downloading files from legitimate websites is no guarantee of safety \u2014 attackers leverage trusted platforms to distribute stealers all the time. <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>\u00a0detects malware on your computer in time and alerts you to the threat.<\/li>\n<li><strong>Don\u2019t store sensitive information in browsers<\/strong>. It\u2019s handy \u2014 no one can argue with that. But unfortunately browsers <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/48784\/\" target=\"_blank\" rel=\"noopener nofollow\">aren\u2019t the most secure environment for your data<\/a>. Sign-in credentials, bank card details, secret notes, and other confidential information are better kept in a securely encrypted format in <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>, which is immune to the exploits used by Stealka.<\/li>\n<li><strong>Be careful with game cheats, mods, and especially pirated software<\/strong>. It\u2019s better to pay up for official software than <a href=\"https:\/\/www.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/53278\/\" target=\"_blank\" rel=\"noopener nofollow\">to chase the false savings offered by software cracks, and end up losing all your money<\/a>.<\/li>\n<li><strong>Enable two-factor authentication or use backup codes wherever possible.<\/strong> <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">Two-factor authentication<\/a> (2FA) makes life much harder for attackers, while backup codes help you regain access to your critical accounts if compromised. Just be sure not to store backup codes in text documents, notes, or your browser. For all your backup codes and 2FA tokens, use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">reliable password manager<\/a>.<\/li>\n<\/ul>\n<blockquote><p>Curious what other stealers are out there, and what they\u2019re capable of? Read more in our other posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tria-stealer-wedding-scam\/52958\/\" target=\"_blank\" rel=\"noopener nofollow\">Beware of stealers disguised as\u2026 wedding invitations<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/54928\/\" target=\"_blank\" rel=\"noopener nofollow\">AMOS infostealer distributed via ChatGPT chat-sharing feature<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/banshee-stealer-targets-macos-users\/52933\/\" target=\"_blank\" rel=\"noopener nofollow\">Banshee: A stealer targeting macOS users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/arcane-stealer-instead-of-cheats-for-minecraft\/53178\/\" target=\"_blank\" rel=\"noopener nofollow\">Arcane stealer instead of Minecraft cheats<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/efimer-trojan-steals-crypto\/54066\/\" target=\"_blank\" rel=\"noopener nofollow\">Efimer Trojan using hacked websites to steal cryptocurrency<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.<\/p>\n","protected":false},"author":2788,"featured_media":55060,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[1278,3443,2640,1499,647,4659,36,3244,723,113],"class_list":{"0":"post-55058","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-browsers","9":"tag-cheats","10":"tag-cryptocurrencies","11":"tag-extensions","12":"tag-gamers","13":"tag-games","14":"tag-malware-2","15":"tag-stealers","16":"tag-trojans","17":"tag-windows"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-stealer-stealka\/55058\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/windows-stealer-stealka\/30057\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/windows-stealer-stealka\/25124\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/windows-stealer-stealka\/29939\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/windows-stealer-stealka\/41117\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/windows-stealer-stealka\/30136\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-stealer-stealka\/35825\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-stealer-stealka\/35481\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/stealers\/","name":"stealers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2788"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=55058"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55058\/revisions"}],"predecessor-version":[{"id":55062,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55058\/revisions\/55062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/55060"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=55058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=55058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=55058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}