According to Kaspersky, cybercriminals are increasingly targeting gamers and their online accounts with a new malware called BloodyStealer.
BloodyStealer is a malware that can steal passwords, cookies, bank card details, browser auto-fill data, device data, screenshots, Desktop and uTorrent client files, logs, and Bethesda, Epic Games, GOG, Origin, Steam, Telegram, and VimeWorld client sessions, according to an ad discovered by the cybersecurity firm’s experts in March of this year.
Despite the fact that Bloodystealer is new, it has been used in Europe, Latin America, and the Asia-Pacific region. The malware’s designers use a malware-as-a-service (MaaS) distribution strategy, which allows BloodyStealer to be purchased on the dark web for either $10 per month or about $40 for a “lifetime license.”
Apart from the ability to steal user data, BloodyStealer features a suite of tools intended to make it tough for security researchers and law enforcement to examine. The malware transfers stolen data in the form of a ZIP package to its command and control server, which is secured against DDoS and other web-based attacks. From here, attackers can access data and online accounts stolen from customers using either its basic control panel or Telegram.