BloodyStealer Trojan targets Steam, GOG and Epic accounts



[ad_1]

A new Trojan called BloodyStealer targets player accounts on EA Origin, Steam, Epic Games, GOG and other services, according to Kaspersky researchers. The malware can recover session data and passwords, as well as information such as credit card details, device data, screenshots, and uTorrent files. “What struck us is that most of the programs listed are gaming related, suggesting that player accounts and their content are in demand in the underground market,” Kaspersky’s Julia Glazova wrote in an article. blog.

BloodyStealer is relatively inexpensive at $ 10 per month or around $ 40 for a lifetime license. Apparently, the main target of the attack is logs or databases with information used to access accounts. These can then be offered to buyers through Telegram or a malware panel. In one example, Kaspersky showed a screenshot of a vendor with 65,600 newspapers broken down by region, available for $ 150. They can also be sold individually – accounts with many games, add-ons, and big-ticket items are especially valuable.

The Trojan stood out among researchers for its clever construction, using anti-debugging tools that make reverse-engineering difficult. The information is sent as a ZIP archive to a Command and Control (C&C) server, protected against DDoS attacks and other types of web attacks.

Kaspersky noted that he saw the malware all over the world and provided tips on how to avoid falling victim to it. It recommends buying apps only from official sources (no torrents) to avoid malware. It also recommends protecting your account with a strong password and preferably two-factor authentication. At the bottom of the article, it also provides guides for maximizing the security settings for each platform.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through any of these links, we may earn an affiliate commission.

[ad_2]

Source link