Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

FBI Launches Steam Investigation After Gaming Malware Steals Millions

16 March 2026 · 3 min read

← All insights

The FBI is actively investigating a sophisticated malware campaign that targeted Steam gaming users, stealing millions in cryptocurrency and personal credentials across a 20-month period ending in January 2026. The investigation reveals how digital entertainment platforms have become critical vectors for financial crime, with seven compromised games including BlockBlasters linked to a single threat actor.

This case demonstrates how infostealer malware has evolved to target gaming platforms as entry points into corporate and personal financial systems. According to the FBI's victim notification form, the malware campaign operated between May 2024 and January 2026, systematically harvesting cryptocurrency wallets, banking credentials, and authentication tokens from unsuspecting gamers.

Key Facts:
- Seven Steam games contained malware linked to the same threat actor
- Campaign operated for 20 months from May 2024 to January 2026
- Malware targeted cryptocurrency wallets and banking credentials
- FBI is actively seeking additional victims through official channels

How Gaming Became a Financial Crime Gateway

The Steam investigation underscores a fundamental shift in attack methodology. Gaming platforms attract millions of users who often maintain multiple payment methods, cryptocurrency wallets, and stored credentials. The NCSC has previously warned that gaming environments present unique security challenges due to their social nature and trusted relationships between users.

The malware's sophistication suggests professional-grade development, capable of bypassing Steam's security measures whilst maintaining persistence across game updates. This mirrors the supply chain attack trends targeting software distribution channels that UK businesses increasingly rely upon.

What This Means for Corporate Gaming Policies

UK businesses face immediate risks from employees accessing gaming platforms on corporate devices or networks. The FBI's findings demonstrate that seemingly benign gaming activities can compromise entire corporate credential stores, particularly where employees reuse passwords or access work systems from gaming devices.

The Financial Conduct Authority's operational resilience requirements mandate that firms identify and manage technology risks from all sources, including indirect exposures through employee gaming activities. This investigation provides concrete evidence that gaming platforms require the same security oversight as other third-party services.

Boardroom Questions

Quick Diagnostic

PTG Intelligence Desk
Pacific Technology Group

Related Reading

Developer Supply Chain Under Siege as GlassWorm Evolves Dependency Attacks — GlassWorm malware has infected 72 new VSCode extensions since January, using sophisticated dependency abuse to bypass ma

CYBERUK 2026 Sets Stage for Next Decade of UK Cyber Defence — The NCSC's flagship conference returns to Glasgow with 2,500+ international security leaders to define UK cybersecurity

GlassWorm Malware Abuses Extension Dependencies to Target UK Developers — GlassWorm supply chain attacks evolve to exploit VS Code extension dependencies, with 72 new malicious extensions target

Smart Factories Create Perfect Storm for OT Cyberattacks — Manufacturing's digital transformation creates dangerous convergence between IT networks and operational technology, wit

86% of UK Businesses Don't Check Supplier Security — NCSC data reveals alarming security gaps as supply chain attacks surge 50%, with manufacturing firms particularly vulner

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch