Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Subscribe
Money Visa
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
Hackers are sneaking malware into game mods to hijack wallets, steal passwords, and compromise everything you trust online
  • Tech

Hackers are sneaking malware into game mods to hijack wallets, steal passwords, and compromise everything you trust online

  • August 1, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0


  • Cheats and mods are now frontlines for cybercrime targeting gamers' wallets and private data
  • Verified crypto wallets like MetaMask and Exodus are being drained through browser injection
  • Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions

Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing themselves to sophisticated malware, experts have warned.

Recent findings from Dr.Web revealed a malware family known as “Trojan.Scavenger” which targets Windows users by disguising itself as cheats or enhancements for popular games.

This seemingly harmless mod can ultimately compromise crypto wallets, password managers, and web browsers, posing serious risks to user privacy and digital assets.


You may like

When cheats become covert threats

The infection chain begins when users download ZIP archives claiming to improve performance in games including the likes of Grand Theft Auto 5 or Oblivion Remastered.

These archives contain modified dynamic libraries, sometimes renamed with extensions like .ASI to resemble legitimate plugin formats.

When the user follows the installation instructions, the malicious library is placed in the same folder as the target game. If the game does not properly validate its libraries, the trojan loads automatically at startup.

In some cases, flaws in library search priorities are essential to the malware’s success, allowing it to hijack execution within the host application.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Once loaded, the malware establishes contact with a command-and-control server using encrypted communication. This process includes verifying encryption keys and checking timestamp consistency, which is meant to evade analysis and block antivirus detection.

The malware doesn’t stop with the initial payload. In more complex infections, it deploys additional trojans that embed themselves in Chromium-based browsers like Chrome, Edge, Opera, and Yandex.

These trojans interfere with browser sandboxing, disable extension verification, and replace legitimate extensions with modified versions.

Crypto wallets such as MetaMask and Phantom, as well as password managers like Bitwarden and LastPass, are among the affected applications.

Modified extensions collect mnemonic phrases, private keys, and stored passwords, which are then transmitted to the attackers' servers.

Exodus, a popular crypto wallet, is also targeted using similar techniques.

By exploiting library loading behavior, the malware extracts sensitive JSON entries, including passphrases and seed data required for generating private keys.

How to stay safe

To stay safe, always apply caution when accessing unofficial content.

Avoid downloading mods or cheats from sketchy forums or unverified sources, especially those shared on torrent platforms or through poorly moderated social media channels.

Antivirus software, while helpful, must be regularly updated to stay effective against evolving threats.

Android antivirus tools may protect mobile platforms, but on desktop systems, more capable solutions are necessary.

Good social media management also helps reduce exposure to malicious content. Limiting interaction with communities known for spreading cracked software or shady patches can lower the risk.

Lastly, checking file paths, verifying digital signatures when available, and restricting admin privileges on daily-use accounts can make it harder for malware to execute successfully.

You might also like

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Everyone’s watching Jerome Powell as warnings flash for the U.S. economy
  • Finance Expert

Everyone’s watching Jerome Powell as warnings flash for the U.S. economy

  • August 1, 2025
  • Roubens Andy King
Read More
Next Article
Liam Neeson’s net worth as ‘The Naked Gun’ hits theaters
  • Trading

Liam Neeson’s net worth as ‘The Naked Gun’ hits theaters

  • August 1, 2025
  • Roubens Andy King
Read More
You May Also Like
since April 2, President Trump has excluded over 0B in US smartphone and laptop imports from tariffs, highlighting conflicting administration goals (Bloomberg)
Read More
  • Tech

since April 2, President Trump has excluded over $100B in US smartphone and laptop imports from tariffs, highlighting conflicting administration goals (Bloomberg)

  • Roubens Andy King
  • August 2, 2025
Wi-Fi 8 is not about speed, and that’s exactly why your next network upgrade depends on it
Read More
  • Tech

Wi-Fi 8 is not about speed, and that’s exactly why your next network upgrade depends on it

  • Roubens Andy King
  • August 2, 2025
Today’s NYT Mini Crossword Answers for Aug. 2
Read More
  • Tech

Today’s NYT Mini Crossword Answers for Aug. 2

  • Roubens Andy King
  • August 1, 2025
ChatGPT is crushing all other AI chatbots, and the numbers prove it
Read More
  • Tech

ChatGPT is crushing all other AI chatbots, and the numbers prove it

  • Roubens Andy King
  • August 1, 2025
NewPipe adds Android Auto support, bringing YouTube to your car
Read More
  • Tech

NewPipe adds Android Auto support, bringing YouTube to your car

  • Roubens Andy King
  • August 1, 2025
Decoding Mark Zuckerberg’s ‘personal superintelligence” plan for Meta
Read More
  • Tech

Decoding Mark Zuckerberg’s ‘personal superintelligence” plan for Meta

  • Roubens Andy King
  • August 1, 2025
Tesla found partially liable for a deadly 2019 crash
Read More
  • Tech

Tesla found partially liable for a deadly 2019 crash

  • Roubens Andy King
  • August 1, 2025
Kleiner Perkins is having a very good week
Read More
  • Tech

Kleiner Perkins is having a very good week

  • Roubens Andy King
  • August 1, 2025

Recent Posts

  • ‘I have never been asked for money before’: My friend wants to borrow $1,600 to pay her rent. Do I say yes?
  • Amazon is selling a 'sturdy' $100 power tool organizer cart for $50, and shoppers say it's 'worth the price'
  • since April 2, President Trump has excluded over $100B in US smartphone and laptop imports from tariffs, highlighting conflicting administration goals (Bloomberg)
  • How to Set Up a Bitcoin Inheritance Plan to Protect Your Crypto
  • Bitcoin Drops Below $115K as Traders Rush to Exit, But a Rebound Could Be Next
Featured Posts
  • ‘I have never been asked for money before’: My friend wants to borrow ,600 to pay her rent. Do I say yes? 1
    ‘I have never been asked for money before’: My friend wants to borrow $1,600 to pay her rent. Do I say yes?
    • August 2, 2025
  • Amazon is selling a 'sturdy' 0 power tool organizer cart for , and shoppers say it's 'worth the price' 2
    Amazon is selling a 'sturdy' $100 power tool organizer cart for $50, and shoppers say it's 'worth the price'
    • August 2, 2025
  • since April 2, President Trump has excluded over 0B in US smartphone and laptop imports from tariffs, highlighting conflicting administration goals (Bloomberg) 3
    since April 2, President Trump has excluded over $100B in US smartphone and laptop imports from tariffs, highlighting conflicting administration goals (Bloomberg)
    • August 2, 2025
  • How to Set Up a Bitcoin Inheritance Plan to Protect Your Crypto 4
    How to Set Up a Bitcoin Inheritance Plan to Protect Your Crypto
    • August 2, 2025
  • Bitcoin Drops Below 5K as Traders Rush to Exit, But a Rebound Could Be Next 5
    Bitcoin Drops Below $115K as Traders Rush to Exit, But a Rebound Could Be Next
    • August 2, 2025
Recent Posts
  • A Reliable Source of Materials Dividends for Global Investors
    A Reliable Source of Materials Dividends for Global Investors
    • August 2, 2025
  • CAPE Is High: Should You Care?
    CAPE Is High: Should You Care?
    • August 2, 2025
  • Pagaya Technologies Ltd. (PGY) Declines More Than Market: Some Information for Investors
    Pagaya Technologies Ltd. (PGY) Declines More Than Market: Some Information for Investors
    • August 2, 2025
Categories
  • Business (1,311)
  • Crypto (706)
  • Economy (105)
  • Finance Expert (1,162)
  • Forex (707)
  • Invest News (1,594)
  • Investing (894)
  • Tech (1,297)
  • Trading (1,281)
  • Uncategorized (1)
  • Videos (775)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.