The FBI has launched an investigation into multiple Steam games containing hidden malware that stole user data and cryptocurrency between 2024 and 2026, with victims urged to come forward to assist federal authorities.
The Federal Bureau of Investigation has initiated a formal investigation into a series of malicious video games distributed through Steam that contained hidden malware designed to steal user data, hijack accounts, and drain cryptocurrency wallets. The investigation, which spans games released between 2024 and 2026, represents one of the most significant coordinated efforts to combat digital fraud within the gaming ecosystem.
The affected titles include Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, Tokenova, and BlockBasters. These games operated as trojan horses, appearing legitimate to users while harboring sophisticated malware payloads that activated upon installation and execution.
BlockBasters emerged as the most notorious case within this investigation, having exfiltrated approximately $32,000 in cancer donation funds from a streamer's accounts in 2025. The malware embedded within these games typically employed automated scripts that scanned victims' browsers for stored login credentials, cryptocurrency wallet addresses, and other sensitive financial information.
According to cybersecurity analysts tracking these incidents, the malware's effectiveness stems from modern browsing habits where users remain logged into multiple services simultaneously. Once activated, the malicious code systematically harvested data from connected accounts, including Steam libraries, payment platforms, and cryptocurrency exchanges.
The proliferation of these malware-infected games has accelerated despite Valve's ongoing efforts to strengthen Steam's vetting processes. Industry observers note that the sheer volume of new game submissions to the platform creates vulnerabilities in the review system. Some malicious actors have exploited this by submitting clean versions of games that later receive updates containing malware payloads, effectively bypassing initial security checks.
Victims of these attacks face multiple consequences beyond immediate financial losses. Compromised Steam accounts may result in permanent loss of purchased game libraries, while stolen personal information can lead to identity theft and ongoing security risks. The FBI's investigation aims to identify the perpetrators behind these schemes and pursue federal prosecution under computer fraud and abuse statutes.
Federal authorities have established multiple channels for affected users to contribute to the investigation. Victims can complete the "Seeking Victim Information" form available on the FBI's official website, providing details about their experiences without fear of exposure. The bureau has also created a dedicated email address, [email protected], for individuals who may have information about affected parties or wish to report incidents anonymously.
The investigation remains voluntary for participants, though authorities emphasize that user cooperation significantly enhances the likelihood of successful prosecution. Those who come forward may be contacted for follow-up interviews or to provide additional technical details about the malware's behavior on their systems.
This case highlights the evolving challenges facing digital distribution platforms as they balance accessibility with security. While Steam continues to implement enhanced verification measures, the sophistication and volume of malicious submissions suggest that platform security remains an ongoing arms race between developers and bad actors.

For users who suspect they may have installed any of the affected titles, security experts recommend immediate system scans using reputable antivirus software, changing passwords for all online accounts, and monitoring financial statements for unauthorized transactions. The FBI investigation underscores the critical importance of exercising caution when downloading software from digital marketplaces, particularly titles from unknown developers or those with limited user reviews.
As the investigation progresses, authorities hope to dismantle the networks responsible for distributing these malicious games and establish precedents for prosecuting digital fraud within the gaming industry. The outcome could influence how digital platforms approach content verification and user protection in an era where software distribution increasingly occurs through centralized marketplaces.

Comments
Please log in or register to join the discussion