Kaspersky Lab experts have discovered that the BloodyStealer Trojan is being sold on the dark web, which is used to steal accounts from accounts of popular gaming platforms, including Steam, Epic Games Store and EA Origin. According to an ad replaced on the darknet, the malware steals various data from the infected device:
- passwords, cookies, bank card data and auto-complete forms from browsers;
- device data;
- files from the desktop and from the uTorrent client;
- sessions in Bethesda, Epic Games, GOG, Origin, Steam, Telegram and VimeWorld clients;
BloodyStealer has a knack for avoiding detection, and it costs less than $ 10 on the darknet for a monthly subscription and $ 40 for an unlimited subscription.
The researchers note that in-game products and accounts are in high demand among cybercriminals. Sign-in credentials for popular gaming platforms (such as Steam, Origin, Ubisoft, or EpicGames) can sell for as low as $ 14 per 1,000 wholesale accounts and up to 30% of the account value for individual accounts.
At the same time, stolen accounts usually appear on the darknet not as a result of leaks, but as a result of targeted attacks by cybercriminals, including the use of malware such as BloodyStealer. It is emphasized that the malware is not only designed to steal information related to games but the platforms that BloodyStealer targets show that the demand for these types of data among criminals is high.
“The Trojan in question is capable of collecting various types of data, such as cookies, passwords, screenshots, data from auto-complete forms and bank cards. BloodyStealer attacks have so far been recorded in Europe, Latin America and the Asia-Pacific region. But this does not mean that it cannot attack users in other countries as well, ”says Dmitry Galov, a cybersecurity expert at Kaspersky Lab.
Although experts did not share information about BloodyStealer’s attack vectors, modding programs and cheating software for various games are usually used to distribute such malware.
Catch up on more stories here
Follow us on Facebook here