Malware disguised as gaming utilities delivers Java-based Trojan that steals credentials and crypto wallets, researchers say.

Cybersecurity researchers have uncovered a widespread malware campaign in which popular gaming utilities and tools are being trojanized to deliver a Java-based backdoor Trojan that can steal credentials, browser data and cryptocurrency wallet files from infected computers.
According to the report, threat actors have embedded malicious Java executables within seemingly legitimate gaming apps, cheat engines and modification tools that are distributed via third-party forums, file sharing sites and social platforms frequented by gamers.
Once installed, the Trojan activates a background process that can monitor user activity, capture login credentials, extract stored browser passwords, and harvest data from various crypto wallets stored on the system. Researchers say the malware also attempts to evade detection by masquerading as a harmless gaming application and disabling certain security features.
Security analysts warn that this type of attack leverages gamers’ trust in unofficial utilities, making it harder for antivirus software to detect the malicious files before they’re run. Users who download tools from unofficial sources may be exposing themselves to credential theft and loss of digital assets.
The advisory urges gamers and general users alike to avoid downloading software from unverified or unofficial sources, to keep both games and operating systems updated, and to use robust security software with real-time protection to identify and block suspicious binaries.
Reports are sourced from official documents, law-enforcement updates, and credible investigations.
Discover additional reports, market trends, crime analysis and Harm Reduction articles on DarkDotWeb to stay informed about the latest dark web operations.






