Steam Game Steals Cancer Donations | Streamer Scam

by Archynetys Technology & Science Desk

Okay, I’m ready to help you create content from the provided text. Here’s the data you need to fill in the Super-Prompt template, followed by the completed template:

Information to Gather (Placeholders):

* 🔶SITE_NAME🔶: BleepingComputer
* 🔶CANONICAL_URL🔶: (Insert the actual URL of the BleepingComputer article here.its crucial to have the correct URL for SEO and attribution.)
* 🔶DATE_PUBLISHED🔶: 2025-09-22 (Based on the dates in the article)
* 🔶AUTHOR_NAME🔶: (The article doesn’t explicitly state an author. If there’s an author listed on the actual webpage, use that. If not, you might use “BleepingComputer News” or similar.)
* 🔶SHORT_TITLE🔶: Steam Game ‘Block Blasters‘ Steals Crypto from Gamers
* 🔶KEYWORDS🔶: Steam,malware,Block Blasters,cryptocurrency,crypto drainer,security,gaming,Stealc,information stealer
* 🔶SUMMARY🔶: A Steam game called ‘block Blasters’ was found to contain malware that stole cryptocurrency from gamers,including one streamer raising money for cancer treatment. The attack affected hundreds of Steam accounts, resulting in significant financial losses.

Completed Super-Prompt Template:

<!--─────────────────────────────────────────────────────────────
SUPER-PROMPT v11 - Evergreen News+, Publish-Onyl, Feature-Rich
Copy everything in this box into your LLM.Swap each 🔶 PLACEHOLDER with your own value (site name, canonical URL, etc.).
WordPress will inject raw source HTML where <div>
	   
<p style="text-align:center"></p>

<p>A gamer seeking financial support for cancer treatment lost $32,000 after downloading from Steam a verified game named Block Blasters that drained his cryptocurrency wallet.</p>

<p>Block Blasters is a 2D platformer that was available on Steam for almost two months, between July 30 and September 21. The game was safe until August 30, when a <a href="http://steamdb.info/depot/3872351/history/" target="_blank" rel="nofollow noopener">cryptodrainer component was added</a>.</p>

<p>Published by developer Genesis Interactive and <a href="http://web.archive.org/web/20250921181738/https://store.steampowered.com/app/3872350/BlockBlasters/" target="_blank" rel="nofollow noopener">no longer on Steam</a>, the retro-styled game was a free-to-play title promising fast-paced action on responsive controls, and had a few hundred 'Very positive' reviews on the gaming platform.</p>

<p>The malicious component in the game was revealed during a live fundraising from video game streamer <a href="https://x.com/rastalandTV/status/1969629808788181258" target="_blank" rel="nofollow noopener">Rastalandtv</a>who was trying to raise funds for life saving treatment against stage 4 high-grade sarcoma.</p>

<p>The gamer also started a <a href="https://www.gofundme.com/f/57p5a-help-me-beat-stage-4-cancer" target="_blank" rel="nofollow noopener">GoFundMe crowdsourcing campaign</a> to receive donations. At the time of writing, completion of the goal is at 58%. Though, some members of the crypto community offered to cover the loss. Crypto influencer <a href="https://x.com/ZssBecker/status/1969774353211695441" target="_blank" rel="nofollow noopener">Alex Becker</a> said that he sent Rastaland $32,500 to a safe wallet.</p>

<p>As the Latvian gamer <a href="https://x.com/rastalandTV/status/1969629808788181258" target="_blank" rel="nofollow noopener">explains</a>he lost more than $32,000 after downloading a verified game on Steam.</p>

<div style="text-align:center">
<figure class="image" style="display:inline-block"><img alt="The malicious game on Steam" height="600" src="https://www.bleepstatic.com/images/news/u/1220909/2025/September/steam.jpg" width="484"/><figcaption><strong>The malicious game on Steam</strong><br/><em>Source: Internet Archive</em></figcaption></figure></div>

<p>Crypto investigator ZachXBT told BleepingComputer that the attackers appear to have stolen <a href="https://x.com/zachxbt/status/1969793042531107300" target="_blank" rel="nofollow noopener">a total of $150,000</a> from 261 Steam accounts.</p>

<p>VXUnderground security group, who has also been <a href="https://x.com/vxunderground/status/1969786282831130872" target="_blank" rel="nofollow noopener">following the attack</a>reports a higher victim count of 478, and <a href="https://pastebin.com/g3JSYHQi" target="_blank" rel="nofollow noopener">published a list</a> of usernames, urging their owners to instantly reset their passwords.</p>

<p>Reportedly,these people were explicitly targeted after being identified over Twitter for managing significant cryptocurrency amounts,and were presumably sent invitations to try out the game.</p>

<p>A <a href="https://x.com/John5725424446/status/1969896301119819791" target="_blank" rel="nofollow noopener">group</a> of researchers <a href="https://s3.us-east-005.backblazeb2.com/vx-underground-main/Malware%20Analysis/2025/2025-09-21%20-%20Block%20Blasters%20-%20Forensic%20Report/Paper/2025-09-21%20-%20Block%20Blasters%20-%20Forensic%20Report.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=005e2c099359ccf0000000004%2F20250922%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20250922T052246Z&amp;X-Amz-Expires=3600&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Signature=239334631df4839d8e26e7aeae88fb3c1c5b03dacf1039cae49b109b68f783f1" target="_blank" rel="nofollow noopener">published a brief report</a> detailing the dropper batch script that performs environment checks before it collects Steam login information along with the victim's IP address, and uploads the data to a command and control (C2) system.</p>

<p>GDATA researcher <a href="https://x.com/struppigel/status/1969974814459736397" target="_blank" rel="nofollow noopener">Karsten Hahn</a> also documented a Python backdoor, and a <a href="https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/" target="_blank" rel="nofollow noopener">Stealc</a> payload, used alongside the batch stealer.</p>

<div style="text-align:center">
<figure class="image" style="display:inline-block"><img alt="Data theft routine" height="533" src="https://www.bleepstatic.com/images/news/u/1220909/2025/September/data-theft.jpeg" width="842"/><figcaption><strong>Data theft routine</strong><br/><em>Source: @struppigel | X</em></figcaption></figure></div>

<p>Investigators also highlighted an operational security failure where the attackers left their Telegram bot code and tokens exposed.</p>

<p>There are unconfirmed reports that OSINT experts participating in the hunt <a href="https://x.com/vxunderground/status/1969912677914103847" target="_blank" rel="nofollow noopener">identified the threat actor</a> as an Argentinian immigrant living in Miami, Florida.</p>

<p>BleepingComputer has contacted Valve for a comment on Block Blasters and the alleged inaction following multiple reports, but we have not received a response by publication time.</p>

<p>The Block Blasters incident is not an isolated one on Steam. Similar cases earlier this year include the <a href="https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/" target="_blank" rel="nofollow noopener">Chemistry</a> survival crafting game, <a href="https://www.bleepingcomputer.com/news/security/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware/" target="_blank" rel="nofollow noopener">sniper: Phantom's Resolution</a>and <a href="https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/" target="_blank" rel="nofollow noopener">Piratefi</a>all of which infected unsuspecting victims with information-stealing malware.</p>

<p>If you have installed Block Blasters on your computer, it is recommended to reset your Steam passwords immediately and move your digital assets to new wallets.</p>

<p>In general, it is indeed advisable to be cautious with Steam games that have a small number of downloads and reviews, and also titles in 'beta' development stage, as those can hide malware payloads.</p>

	   
<div class="ia_ad">
    <div class="ia_lef">
        <a href="https://hubs.li/Q03B5Kw_0" target="_blank" rel="noopener sponsored">
            <img alt="Picus Blue Report 2025" src="https://www.bleepstatic.com/c/p/picus/blue-report-2025.jpg" class="b-lazy"/></a>
    </div>
    <div class="ia_rig">
        
<p>46% of environments had passwords cracked, nearly doubling from 25% last year.</p>
<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.</p>
        <button class="ia_button"><a href="https://hubs.li/Q03B5Kw_0" target="_blank" rel="noopener sponsored">Get the Blue Report 2025</a></button>
    </div>
</div>

           
          
 
	  </div>


<!--OUTPUT_HTML_START-->
<!--─────────────────────────────────────────────────────────────
SUPER-PROMPT v11 - Evergreen News+, Publish-Only, Feature-Rich
Copy everything in this box into your LLM.Swap each 🔶 PLACEHOLDER with your own value (site name, canonical URL, etc.).WordPress will inject raw source HTML where <div> is.
─────────────────────────────────────────────────────────────-->
<details>
	<summary>⚙️ Instructions: Evergreen News+ (click to expand)</summary>
	
	You are an expert SEO content creator for a news website. You create evergreen news articles that are highly informative and optimized for search engines. You use a amiable and engaging tone.

	**Article Context:**
	- 🔶SITE_NAME🔶: BleepingComputer
	- 🔶CANONICAL_URL🔶: [INSERT ACTUAL BLEEPINGCOMPUTER ARTICLE URL HERE]
	- 🔶DATE_PUBLISHED🔶: 2025-09-22
	- 🔶AUTHOR_NAME🔶: [INSERT AUTHOR NAME HERE or BleepingComputer News]
	- 🔶SHORT_TITLE🔶: Steam Game 'Block Blasters' Steals Crypto from Gamers
	- 🔶KEYWORDS🔶: Steam, malware, Block Blasters, cryptocurrency, crypto drainer, security, gaming, Stealc, information stealer
	- 🔶SUMMARY🔶: A Steam game called 'Block Blasters' was found to contain malware that stole cryptocurrency from gamers, including one streamer raising money for cancer treatment. The attack affected hundreds of Steam accounts, resulting in significant financial losses.

	**Instructions:**

	1.  **Article Length:** Aim for 700-900 words.
	2.  **Headline:** Write a compelling headline that includes the primary keyword and entices clicks.
	3.  **Introduction:** start with a hook that grabs the reader's attention. Briefly introduce the Block Blasters malware incident and its impact. Include the keyword early in the introduction.
	4.  **Body:**
		*   Expand on the details of the incident, including how the malware worked, who was affected, and the financial losses.
		*   Explain the technical aspects of the malware, such as the dropper batch script, Python backdoor, and Stealc payload.
		*   Discuss the operational security failures of the attackers.
		*   Mention the unconfirmed reports about the threat actor's identity.*   Include information about similar malware incidents on Steam.
		*   Provide clear and actionable advice for users who may have been affected.
	5.  **Keywords:** Naturally incorporate the provided keywords throughout the article. Don't stuff keywords, but ensure they are present in headings, subheadings, and body text.6.  **SEO Optimization:**
		*   Use short,descriptive URLs.
		*   Write a compelling meta description.
		*   Use header tags (H2, H3) to structure the content and include keywords.
		*   Add internal and external links to relevant resources.
		*   Optimize images with alt text.
	7.  **Call to Action:** Encourage readers to take action, such as resetting their Steam passwords and moving their digital assets to new wallets.
	8.  **Tone:** Maintain a professional, informative, and slightly cautionary tone.
	9.  **Evergreen Content:** Write the article in a way that it remains relevant over time.Avoid time-sensitive language.
	10. **Factuality:** ensure all information is accurate and supported by the provided source material.
</details>

WRITE THE ARTICLE.

Important Considerations:

* Replace the bracketed placeholder for the canonical URL with the actual URL of the article on BleepingComputer.
* Choose an appropriate author name if one is listed on the original article.
* Carefully review the output from the LLM and edit it to ensure accuracy, clarity, and adherence to BleepingComputer’s style guidelines.
* Double-check all links to make sure they are working correctly.

Now you can copy this entire block into your LLM and generate the article. Good luck!

Related Posts

Leave a Comment