FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

FBI Probes Steam Games Hiding Malware, Seeks Victims

Gregory Zuckerman
Last updated: March 13, 2026 10:03 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

The FBI is investigating a wave of malicious titles sold through Valve’s Steam store that secretly installed malware, and the bureau is urging potential victims to come forward. Investigators say threat actors smuggled code into seemingly legitimate games and updates, then used the access to steal credentials, drain crypto wallets, and loot Steam inventories. Several offending games have already been removed from the platform.

What The FBI Says And Which Games Were Flagged

The FBI’s Seattle Field Office is seeking reports from Steam users who downloaded suspect titles and later noticed account takeovers, missing inventory items, or unauthorized financial activity. According to the bureau, identified games include BlockBlasters, Chemia, Dashverse (also listed as DashFPS), Lampy, Lunara, PirateFi, and Tokenova.

Table of Contents
  • What The FBI Says And Which Games Were Flagged
  • How The Scheme Worked To Spread Malware Via Steam
  • Why Steam Inventories And Crypto Are Prime Targets
  • What Players Should Do Now To Protect Accounts And Funds
  • What It Means For Platforms And Digital Storefront Security
The Steam logo and name are centered on a background composed of various video game covers, all resized to a 16:9 aspect ratio.

Agents are asking affected users to share their Steam username, which game versions they installed, and whether they received any unsolicited messages before or after downloading the titles. That last point matters: many malware campaigns pair a Trojanized download with social engineering, such as direct messages offering “exclusive keys,” tournament invites, or influencer collaborations designed to coax victims into running the payload.

Valve has delisted the named games after they were discovered to contain malicious components. While several of the titles drew limited attention, at least one case tied to BlockBlasters allegedly culminated in a crypto theft worth roughly $150,000 from an infected machine.

How The Scheme Worked To Spread Malware Via Steam

Based on victim accounts and common tactics seen in the wild, attackers leveraged two vectors: newly published games built with hidden malware from day one, and previously legitimate releases that shipped a compromised update. In both scenarios, the Steam client became the delivery channel, blending malicious code into the normal patch cadence that players expect.

Once executed, the malware acted like an information-stealer, hunting browser cookies, session tokens, saved passwords, and wallet data. With control of authentication tokens, criminals can often bypass passwords and two-factor prompts long enough to empty crypto apps, hijack email and social accounts, or rifle through Steam inventories to transfer and resell valuable in-game items. Security firms such as ESET, Sophos, and Kaspersky have documented similar “infostealer” families targeting gamers across PC ecosystems.

A laptop displaying the Steam logo and name on its screen, with a gaming controller in the foreground, resized to a 16:9 aspect ratio.

The financial upside for criminals is obvious. The FBI’s Internet Crime Complaint Center reports multibillion-dollar annual cybercrime losses, and Chainalysis has noted that crypto hacks and wallet-draining scams continue to account for substantial on-chain theft. Trojanized games neatly bridge both worlds: they can seize credentials and liquid assets in one hit.

Why Steam Inventories And Crypto Are Prime Targets

Steam’s economy turns pixels into money. Rare skins and trading cards can be flipped on third-party markets, and compromised accounts give thieves a direct line to tradable goods. The same machine often also holds hot crypto wallets and browser extensions, making it a one-stop shop for asset theft. That mix of liquidity and immediacy is precisely what modern stealers are built to exploit.

Complicating matters, many indie games ship frequent updates, and early access titles evolve quickly. That pace, combined with a low barrier to publish, makes continuous vetting hard. Without stronger guardrails around developer identity, code integrity, and behavior-based scanning, marketplaces face the same “supply chain” risks seen elsewhere in software.

What Players Should Do Now To Protect Accounts And Funds

  • Check your Steam library for BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova. If present, remove them and scan your system with reputable anti-malware from multiple vendors.
  • Review your Steam market and trade history, and reset Steam Guard, email, and password. Revoke any active sessions and reset app passwords tied to the same machine.
  • For crypto, move funds to a fresh wallet with new seed phrases generated offline. Assume browser wallets and extensions on the infected device are compromised; reimport only after a clean rebuild.
  • Preserve evidence. Keep screenshots of messages, transaction IDs, and system logs. The FBI is requesting victim details via a public intake form through its Seattle office, and affected users can also submit a report to IC3. These details help investigators trace infrastructure, laundering paths, and developer accounts behind the scheme.

What It Means For Platforms And Digital Storefront Security

This incident underscores a broader trust challenge for digital storefronts: when distribution is frictionless, verification must be relentless. Stronger developer onboarding, mandatory two-factor for publishers, signed and attestable builds, and behavior-based malware screening can shrink the window for abuse. Faster kill-switches for delisting and forced uninstalls, paired with account protection nudges, would further reduce downstream harm.

For now, the FBI’s investigation is a reminder that even legitimate channels can deliver tainted code. Gamers should treat cold DMs and off-platform key offers as red flags, and platforms need to meet attackers’ creativity with equally adaptive defenses.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
How Faceless Video Is Transforming Digital Storytelling
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.