Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch

BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch

Posted on September 22, 2025September 22, 2025 By CWS

A seemingly harmless patch replace for the favored 2D platformer recreation BlockBlasters has reworked into a classy malware marketing campaign, exposing tons of of Steam customers to information theft and system compromise.

The malicious patch, deployed on August 30, 2025, demonstrates how risk actors are more and more exploiting the gaming ecosystem to distribute information-stealing malware whereas customers stay unaware of the continued compromise.

BlockBlasters, developed by Genesis Interactive and initially launched on July 31, 2025, had garnered optimistic opinions from the gaming group earlier than turning into the newest sufferer in a rising pattern of Steam recreation infections.

The malicious Construct 19799326 patch accommodates a number of information that exhibit harmful behaviors, reworking what gave the impression to be a routine recreation replace right into a multistage assault able to exfiltrating delicate consumer information together with cryptocurrency pockets data, browser credentials, and Steam login particulars.

G Information analysts recognized the malware marketing campaign after their MXDR platform flagged the suspicious actions inside the recreation’s patch information.

The safety researchers found that the risk actors had efficiently bypassed Steam’s preliminary safety screening, permitting the deployment of malicious updates that might probably have an effect on tons of of gamers who had the sport put in on their techniques.

This incident follows a regarding sample of comparable assaults on Steam video games, together with the notable PirateFi and Chemia circumstances, highlighting the platform’s ongoing vulnerability to such subtle infiltration makes an attempt.

The assault represents a major escalation in gaming-focused malware campaigns, as risk actors proceed to refine their methods for distributing malicious payloads by way of professional software program distribution channels.

The incident notably stands out as a consequence of its multistage an infection course of and the vary of delicate information it targets, making it a complete data theft operation relatively than a easy malware set up.

Technical An infection Mechanism and Payload Supply

The BlockBlasters malware operates by way of a classy three-stage an infection mechanism that begins with the execution of a seemingly benign batch file named game2.bat.

This preliminary payload performs a number of reconnaissance features, together with gathering IP and placement data by way of queries to professional providers like “ipinfo[.]io” and “ip[.]me”, whereas concurrently detecting put in antivirus merchandise to evaluate the goal setting’s safety posture.

The batch file’s main operate entails gathering Steam login credentials, together with SteamID, AccountName, PersonaName, and RememberPassword information, which it then uploads to the command and management server positioned at hxxp://203[.]188[.]171[.]156:30815/add.

The malware employs password-protected ZIP archives with the password “121” to hide its payloads throughout obtain, successfully evading preliminary detection mechanisms.

SteamDB Patch Recordsdata from SteamDB (Supply – G Information)

Upon profitable setting evaluation, the malware deploys VBS loader scripts (launch1.vbs and check.vbs) that execute further batch information whereas sustaining stealth by way of hidden console execution.

The check.bat part particularly targets browser extensions and cryptocurrency pockets information, demonstrating the marketing campaign’s concentrate on high-value monetary data.

The ultimate stage entails the deployment of two main payloads: Consumer-built2.exe, a Python-compiled backdoor that establishes persistent communication with the C2 infrastructure, and Block1.exe, which accommodates the StealC data stealer.

The malware strategically provides its execution listing to Microsoft Defender’s exclusion listing utilizing the trail Drive:SteamLibrarysteamappscommonBlockBlastersEngineBinariesThirdPartyOggcwe, guaranteeing continued operation with out triggering safety alerts.

Game2.bat unpacking information inside password-protected archives after which executing it (Supply – G Information)

The StealC part targets a number of browsers together with Google Chrome, Courageous Browser, and Microsoft Edge, accessing their respective Native State information to extract saved credentials and delicate data.

The malware makes use of deprecated RC4 encryption to obfuscate its API calls and key strings, connecting to a secondary C2 server at hxxp://45[.]83[.]28[.]99 for information exfiltration operations, demonstrating the marketing campaign’s distributed infrastructure strategy to sustaining operational safety.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:BlockBlasters, Computer, Disguised, Downloads, Game, Malware, Patch, Steam

Post navigation

Previous Post: Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
Next Post: Top 10 Best Supply Chain Risk Management Solutions in 2025

Related Posts

New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices Cyber Security News
Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark