77,000 Steam Accounts Hacked Monthly: Are YOU Next? Valve's Security FAIL
NovumWorld Editorial Team

77,000 Steam Accounts Hacked Monthly: Are YOU Next? Valve’s Security FAIL
Valve’s anti-cheat measures are failing to protect users, and the problem is far worse than the company admits.
- Valve reported approximately 77,000 Steam accounts were hacked monthly in 2015, highlighting an ongoing security risk for users.
- The FBI has identified several Steam games, including BlockBlasters, containing malware designed to steal user information, demonstrating the potential for significant financial loss.
- Activating Steam Guard and using unique passwords are crucial steps users can take to protect their accounts from potential breaches and financial harm.
The $150,000 Cryptocurrency Heist: Steam’s Malware Problem
Financial loss due to Steam malware is a serious threat, with users losing substantial amounts to these attacks. One user reportedly lost $150,000 in cryptocurrency due to the BlockBlasters malware, highlighting the severe financial consequences of these breaches. The FBI has identified several Steam games with embedded malware, including BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova.
These games are designed to steal user information, including login credentials and financial data. The fact that such malware-infected games can make it onto the Steam platform raises significant questions about Valve’s vetting process and security measures. The financial impact on users can be devastating, with losses potentially running into the hundreds of thousands of dollars. Valve needs to take immediate action to remove these malicious games from its platform and implement stricter security protocols to prevent future incidents.
The ease with which malware can be distributed through Steam is alarming. The incident involving BlockBlasters serves as a stark reminder of the risks associated with downloading and playing games from unverified sources. While Steam has measures in place to prevent the distribution of malicious software, these measures are clearly not effective enough. Valve must invest in better detection and prevention technologies to protect its users from these types of attacks. This includes enhancing its malware scanning capabilities and implementing stricter review processes for games before they are made available on the platform.
The Anti-Cheat Achilles Heel: Why VAC Isn’t Cutting It
Valve’s Anti-Cheat (VAC) system is often criticized for being ineffective, especially when compared to other anti-cheat systems in the industry. An anonymous developer of Counter-Strike 2 cheats exposed weaknesses in Valve’s Anti-Cheat (VAC) system, claiming it’s outdated and lacks kernel-level monitoring. This lack of kernel-level monitoring allows external cheats to run undetected, giving cheaters an unfair advantage and ruining the gaming experience for legitimate players. The developer also claimed that Valve’s anti-cheat team is understaffed, which further exacerbates the problem.
The criticisms of VAC are not new. For years, players have complained about the prevalence of cheaters in Counter-Strike and other Valve games. While Valve has made some improvements to VAC over the years, it still lags behind other anti-cheat systems in terms of effectiveness. The fact that cheat developers can easily bypass VAC is a testament to its weaknesses. Nathanson’s Prediction: YouTube TV Will Dethrone Comcast By 2026. Can They?
A major flaw in VAC is its reliance on signature-based detection. This means that VAC can only detect cheats that it already knows about. Cheat developers can easily circumvent this by creating new cheats that are not yet recognized by VAC. To address this issue, Valve needs to invest in more advanced anti-cheat technologies, such as machine learning and behavioral analysis. These technologies can help detect cheats that are not based on known signatures, making it more difficult for cheaters to bypass VAC.
Zero-Day Scars: Valve’s Bug Bounty Blunder
Valve’s handling of security vulnerabilities has been questionable at times, leading to criticism and distrust from the security community. Security researcher Vasily Kravets was banned from Valve’s bug bounty program after reporting a zero-day exploit, highlighting potential issues in their vulnerability handling. This incident raises concerns about Valve’s commitment to security and its willingness to work with external researchers to identify and fix vulnerabilities.
Zero-day exploits are particularly dangerous because they are unknown to the vendor, meaning there is no patch available to protect against them. When a security researcher discovers a zero-day exploit, it is crucial that the vendor takes immediate action to address the vulnerability. However, in the case of Vasily Kravets, Valve initially dismissed the vulnerability and banned him from their bug bounty program. This response was widely criticized by the security community, who argued that it discouraged researchers from reporting vulnerabilities to Valve.
After facing criticism, Valve eventually reversed its decision and patched the vulnerability. However, the damage was already done. The incident had eroded trust between Valve and the security community, making it less likely that researchers would report vulnerabilities to the company in the future. Valve needs to learn from this mistake and take steps to improve its relationship with the security community. This includes establishing clear guidelines for reporting vulnerabilities and ensuring that researchers are treated fairly and respectfully. The Connections Alternative #377 2026-03-12 : r/NYTConnections on Reddit serves as a reminder that community efforts can often highlight flaws that corporate systems miss.
Trust No Game: The Hidden Costs of “Free” Titles
The presence of malware in “free” games on Steam highlights a significant risk for users. The FBI identified several Steam games with embedded malware, including BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova, indicating a distribution problem within the Steam ecosystem. These games often lure users in with the promise of free entertainment, but they can come with a hidden cost: the risk of malware infection and data theft.
The fact that these games are available on Steam, a reputable platform, gives users a false sense of security. Many users assume that games on Steam have been thoroughly vetted and are safe to download. However, this is clearly not the case. Valve needs to do a better job of screening games before they are made available on the platform to prevent the distribution of malware.
One potential solution is to implement a more rigorous review process for games that are offered for free. This could involve requiring developers to submit their games for malware scanning and code review before they are approved for distribution. Valve could also partner with third-party security firms to conduct independent security audits of games on the platform. By taking these steps, Valve can help reduce the risk of malware infections and protect its users from financial losses and data theft.
The Inevitable Breach: Is Steam Guard Enough?
Even with Steam Guard enabled, users are still vulnerable to sophisticated attacks. In 2021, zero-day exploits accounted for 40% of all emerging threats over the past decade, with a surge of over 100% compared to 2019. This illustrates the increasing prevalence of these types of attacks even with preventative measures in place. While Steam Guard adds an extra layer of security, it is not a foolproof solution.
Steam Guard relies on two-factor authentication, which requires users to enter a code from their phone or email in addition to their password. This makes it more difficult for hackers to gain unauthorized access to accounts, but it is not impossible. Hackers can still bypass Steam Guard through phishing attacks, malware infections, or by exploiting vulnerabilities in the Steam platform itself.
Given the increasing sophistication of cyberattacks, it is essential that users take additional steps to protect their accounts. This includes using strong, unique passwords, being wary of phishing attempts, and keeping their computers and devices secure. It is also important to regularly monitor Steam accounts for any suspicious activity. If users notice anything unusual, they should immediately change their password and contact Steam support. The FBI’s report on internet crime underscores the pervasive nature of these threats across all online platforms.
The Bottom Line
Valve needs to drastically improve its anti-cheat measures, increase staff, and be more transparent with its users about security vulnerabilities. Enable Steam Guard immediately.
Game Over? Not Yet.