A seemingly normal Steam game was used to push malware that silently drained players’ crypto wallets – in one case, around $150K. The scam only worked because victims trusted the app, disabled security warnings, and ran unknown software with high privileges. That’s exactly what most people do with Windows activators and KMS tools: copy commands from random sites, turn off AV, “trust the tutorial”. If a criminal can convince you to run anything as admin, they don’t just get “free Windows” – they get full control of your machine and your money.
The BlockBlasters incident isn’t just an isolated story – several independent reports have documented how the malware-infected Steam game drained more than $150,000 in crypto from players, including around $32,000 stolen from Latvian streamer Raivo “RastalandTV” Plavnieks while he was raising money for cancer treatment. A detailed technical analysis by G DATA explains how the August 30 patch added a cryptodrainer component to the game, turning a seemingly harmless 2D platformer into wallet-stealing malware, while coverage from SSLs.com and Eneba’s news hub walks through the human side of the scam and the broader impact on Steam’s security reputation.
The Steam scam in one gamer’s story
- An indie-looking game appeared on Steam with a normal store page, trailer and keys sent to streamers.
- Inside the installation flow, an additional “launcher/anti-cheat” quietly dropped malware.
- The malware watched for crypto wallets, password managers and browser sessions, then exfiltrated credentials and seed phrases.
- Victims only noticed days or weeks later, when their wallets had already been emptied.
- By the time the game was taken down, the stolen funds were effectively gone.
The trust pattern: why people run dangerous software
- Social proof: if it’s on Steam or in a popular YouTube tutorial, it must be legit… right?
- “Everyone does it”: pirated games, KMS tools and MAS scripts are treated as normal “hacks” in some communities.
- Disabling protections: users are told to turn off antivirus, ignore SmartScreen, and run scripts as admin because “it’s a false positive”.
- Delayed impact: nothing explodes instantly – the scam works precisely because you don’t see the damage immediately.
Windows activators: same risk, different wrapper
- Windows activators (including MAS clones and repacks) ask you to:
- Download files from unverified mirrors.
- Paste and run PowerShell commands with admin rights.
- Ignore security warnings because “AV doesn’t like activators”.
- Even if the original project is open-source, malicious copies only need a tiny code change to add:
- A password/credential stealer.
- A RAT (Remote Access Trojan).
- Crypto-mining or data exfiltration.
- The pattern is identical to the fake Steam game: convince tech-savvy users to run “special” software with maximum privileges.
Want the deep technical breakdown?
See “Is Massgrave safe? Risks of Windows activators & legal options”
Safer alternatives: boring but secure
- A genuine Windows key costs less than a AAA game or a nice skin, and massively reduces your risk.
- What to look for in a seller:
- Clear product pages (Windows 10 / Windows 11, Home vs Pro, OEM vs Retail).
- Order confirmation, invoice and stated warranty/support.
- No “mystery scripts”, just a 25-character key and official install links.
- Internal links to push:
- Windows 10 Keys for people still on Windows 10.
- Windows 11 Keys for users ready to upgrade hardware and OS.
Is every Windows activator malware?
No, but from a practical point of view, downloading random scripts, disabling your antivirus and running them as admin is almost indistinguishable from installing malware on purpose. The risk/benefit ratio is terrible.
If Valve removed the malicious game, am I safe now?
Not automatically. If you installed or launched it, assume compromise: change passwords, revoke tokens, check your wallets and scan your machine with reputable security tools.
What if I run activators in a VM?
Not automatically. If you installed or launched it, assume compromise: change passwords, revoke tokens, check your wallets and scan your machine with reputable security tools.
What’s the simplest “sleep-at-night” option?
Buy a cheap genuine key, activate once, and move on with your life. The money you “save” with activators is nothing compared to a compromised wallet or leaked credentials.

