
Briefly
- Cybersecurity consultants at Kaspersky have found a brand new sort of infostealer that has the flexibility to steal delicate information from all kinds of Home windows-based browsers and apps.
- Hackers are inserting the malware in unofficial mods for video games similar to Roblox, in addition to varied Home windows apps.
- Kaspersky tells Decrypt that it has no knowledge on the quantity of crypto stolen utilizing the infostealer.
Hackers are inserting infostealer malware into pirated mods for Roblox and different video games, based on analysis from cybersecurity firm Kaspersky.
A weblog publish from Kaspersky reveals that it has recognized a brand new number of infostealer known as Stealka, which it has thus far encountered on distribution platforms similar to GitHub, SourceForge, Softpedia and websites.google.com.
Disguised as unofficial mods, cheats and cracks for Home windows-based video games and different apps, Stealka exfiltrates delicate login and browser info, which its operators can use to steal crypto.
Crypto wallets focused
The malware primarily targets knowledge contained by browsers similar to Chrome, Firefox, Opera, Yandex Browser, Edge, Courageous, in addition to the settings and databases of over 100 browser extensions.
Such extensions embrace cryptocurrency wallets from Binance, Coinbase, MetaMask, Crypto.com and Belief Pockets, in addition to password managers (1Password, NordPass, LastPass) and 2FA apps (Google Authenticator, Authy, Bitwarden).
Actually, Stealka’s attain doesn’t cease with browser extensions, since it could additionally elevate (encrypted) personal keys, seed phrase knowledge and pockets file paths from standalone cryptocurrency pockets apps.
This consists of apps from Binance, Exodus, MyCrypto and MyMonero, in addition to pockets apps for Bitcoin, BitcoinABC, Dogecoin, Ethereum, Monero, Novacoin and Photo voltaic.
Away from crypto, the Stealka malware has the flexibility to steal knowledge and authentication tokens for messaging apps (e.g. Discord and Telegram), password supervisor apps (e.g. 1Password, Bitward, LastPass), electronic mail shoppers (e.g. Gmail Notifier Professional, Mailbird, Outlook), notetaking apps (NoteFly, Notezilla, Microsoft StickyNotes), and VPN shoppers (e.g. OpenVPN, ProtonVPN, WindscribeVPN).
Talking to Decrypt, Kaspersky cybersecurity knowledgeable Artem Ushkov defined that the brand new malware “was detected by Kaspersky endpoint safety options on Home windows machines in November 2025.”
As is the case with related malware, Ushkov reviews that a lot of the customers focused by Stealka are based mostly in Russia.
“Nonetheless, assaults by the malware have additionally been detected in different nations, together with Türkiye, Brazil, Germany and India,” he added.
Find out how to keep secure
In view of the risk Stealka, Kaspersky advises in its weblog that, apart from utilizing respected antivirus software program, customers ought to avoid unofficial and pirated mods.
The weblog additionally advises towards storing essential information in browsers, and urges customers to make use of two-factor authentication wherever out there, whereas additionally making use of backup codes (however with out storing them on browsers or in textual content paperwork).
Whereas Stealka’s potential for stealing information and, by extension, crypto appears intimidating, there’s presently no indication that it has resulted in important losses.
“We aren’t conscious of the quantity of crypto that has been stolen utilizing it,” stated Ushkov. “Our options shield towards this risk: all detected Stealka malware was blocked by our options.”


