BlockBlasters Steam Game Downloads Malware: A New Threat on the Rise

The recent discovery of malware embedded in downloads of the popular Steam game BlockBlasters has raised significant concerns in the cybersecurity community. This incident highlights the growing trend of threat actors exploiting popular gaming platforms to distribute malicious software. The malware, disguised as legitimate game files, can compromise users' systems, leading to data theft, unauthorized access, and potential financial loss. Gamers and cybersecurity professionals alike must remain vigilant and adopt robust security measures to mitigate these risks. This article delves into the specifics of the BlockBlasters malware incident, its implications for the gaming industry, and best practices for prevention and response. Malware distribution through gaming platforms is not new, but the sophistication and scale of recent attacks have escalated. The BlockBlasters case exemplifies how cybercriminals leverage the popularity of games to reach a broad audience. By embedding malware in game downloads, attackers can bypass traditional security filters and exploit users' trust in legitimate platforms like Steam. The consequences of such infections can be severe, ranging from system hijacking to the installation of ransomware or spyware. To combat this threat, users should ensure they download games and updates exclusively from official sources and verify the integrity of files before installation. Employing comprehensive antivirus solutions and keeping software up to date are critical steps in defense. Additionally, awareness campaigns and collaboration between gaming companies and cybersecurity experts are essential to identify and neutralize emerging threats promptly. In conclusion, the BlockBlasters malware incident serves as a stark reminder of the evolving tactics used by cyber adversaries. Staying informed, practicing safe downloading habits, and leveraging advanced security tools are paramount to protecting oneself in the digital gaming landscape. The cybersecurity community must continue to monitor such threats and develop innovative strategies to safeguard users worldwide.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 22 Sep 2025 18:56:04 +0000


Cyber News related to BlockBlasters Steam Game Downloads Malware: A New Threat on the Rise

BlockBlasters Steam Game Downloads Malware: A New Threat on the Rise - The recent discovery of malware embedded in downloads of the popular Steam game BlockBlasters has raised significant concerns in the cybersecurity community. This incident highlights the growing trend of threat actors exploiting popular gaming ...
4 months ago Cybersecuritynews.com
Malicious PirateFi game infects Steam users with Vidar malware - Malware infiltrating the Steam store is not common, but it's not unprecedented either. In February 2023, Steam users were targeted by malicious Dota 2 game modes that leveraged a Chrome n-day exploit to perform remote code execution on the ...
11 months ago Bleepingcomputer.com
Game mod on Steam breached to push password-stealing malware - Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push Epsilon information stealer malware using the Steam update system. As developer Michael Mayhem told BleepingComputer, the compromised ...
2 years ago Bleepingcomputer.com
Steam game mod breached to push password-stealing malware - Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push Epsilon information stealer malware using the Steam update system. As developer Michael Mayhem told BleepingComputer, the compromised ...
2 years ago Bleepingcomputer.com
Steam drops support for Windows 7 and 8.1 to boost security - Steam is no longer supported on Windows 7, Windows 8, and Windows 8.1 as of January 1, with the company recommending users upgrade to a newer operating system. The gaming company warned last year that the Steam client would be unsupported in the New ...
2 years ago Bleepingcomputer.com
Browser-in-the-Browser attacks target CS2 players' Steam accounts - A new phishing campaign targets Counter-Strike 2 players utilizing Browser-in-the-Browser (BitB) attacks that display a realistic window that mimics Steam's login page. Basically, this phishing technique creates fake browser windows within real ...
9 months ago Bleepingcomputer.com
Hacker sneaks infostealer malware into early access Steam game - A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. “The compromised executable appears legitimate to users downloading from Steam, creating an ...
6 months ago Bleepingcomputer.com
Hackers Breach Steam Discord Accounts, Launch Malware - On Christmas Day, the popular indie strategy game Slay the Spire's fan expansion, Downfall, was compromised, allowing Epsilon information stealer malware to be distributed over the Steam update system. Developer Michael Mayhem revealed that the ...
2 years ago Cysecurity.news
Regenerate and Conquer: Wolverine's Real-Time Damage System to Dominate the Gaming Landscape - Marvel's Wolverine has leaked details which suggest that the game will use advanced features, even those that are not available on current PlayStation 5 hardware, to play the game. In the recent Insomniac data breach, a new rumour has been ...
2 years ago Cysecurity.news
Steam pulls game demo infecting Windows with info-stealing malware - Valve has removed from its Steam store the game title 'Sniper: Phantom's Resolution' following multiple users reporting that the demo installer infected their systems with information stealing malware. Users that installed the game have likely ...
10 months ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
Fragging: The Subscription Model Comes for Gamers - The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership. Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription ...
2 years ago Eff.org
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
1 year ago Securityintelligence.com
Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva - In recent research on compromised and malicious PyPI packages, Imperva Threat Research has identified an ongoing malware campaign specifically targeting Roblox hackers. Over time, vast communities have assembled on various platforms such as Reddit, ...
1 year ago Imperva.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
2 years ago Hackread.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
3 years ago Hackread.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
1 year ago Pandasecurity.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 year ago Pandasecurity.com
Ransomware attack on indie game maker wiped all player accounts - A ransomware attack on the "Ethyrial: Echoes of Yore" MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. Ethyrial: Echoes of Yore is a free-to-play old-school MMORPG developed by indie game ...
2 years ago Bleepingcomputer.com Metaencryptor Black Basta
NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets - NOVABLIGHT, a NodeJS-based Malware-as-a-Service (MaaS) information stealer, represents a concerning evolution in cybercrime accessibility, allowing virtually anyone to deploy advanced data theft capabilities with minimal technical expertise. This ...
5 months ago Cybersecuritynews.com
Top 10 Best Dynamic Malware Analysis Tools in 2025 - FireEye Malware AnalysisEnterprise-grade solution, zero-day detection, integration with threat intelligence, memory forensics.Enterprise-grade malware detection and forensicsPricing details not publicly available; contact for quote.Yes6. Detux ...
10 months ago Cybersecuritynews.com
Fake CS2 tournament streams used to steal crypto, Steam accounts - The channels that promote these scams are hijacked legitimate YouTube accounts, which the scammers rebrand as needed to impersonate professional players. The security firm warns that the threat actors impersonate professional CS2 players like s1mple, ...
11 months ago Bleepingcomputer.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 year ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 year ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 year ago Cybersecurity-insiders.com