PirateFi game on Steam caught installing password-stealing malware (www.bleepingcomputer.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 17 Feb 11:52
https://sh.itjust.works/post/32955596

#cybersecurity

threaded - newest

Telorand@reddthat.com on 17 Feb 13:41 next collapse

This is an interesting vector, since it costs $100 to even post a free game on Steam. Did the game dev poison their own game, or did someone get access to their account to upload the hacked version? The article doesn’t seem to specify.

DannyBoy@sh.itjust.works on 17 Feb 14:57 collapse

The researcher believes that the web3/blockchain/cryptocurrency references in the PirateFi name were intentional, to lure a specific player base

Article seems to imply it was intentional by the devs. Also making it free to play with no DLC is an unusual business model.

Telorand@reddthat.com on 17 Feb 15:32 collapse

That was my read as well, but the author didn’t make it very clear. I suppose since there wasn’t any effort to restore a “clean” version means, it’s likely that it was intentional.

hazeebabee@slrpnk.net on 18 Feb 05:45 collapse

Super interesting method of entry. It makes a lot of sense as an attack vector. Steam doesn’t have a very rigorous process for checking what they offer on their platform & most customers don’t check their games before running them.

I’m honestly suprised it hasn’t happened more frequently. I wonder if the amount of press this particular incident is getting will cause steam to change their process for publishing games.