
CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
The Future of Shopping? AI + Actual Humans.
AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.
Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.
The data shows:
Only 10% of shoppers buy through AI-recommended links
87% discover products through creators, blogs, or communities they trust
Human sources like reviews and creators rank higher in trust than AI recommendations
The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.
Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.
Stealka Infostealer Targets Gamers to Steal Cryptocurrency and Accounts

Cybersecurity researchers have identified a new information-stealing malware campaign targeting video gamers and cryptocurrency users.
The malware, known as Stealka, is being distributed through fake game cracks, cheats, and mods. Once executed, it is capable of stealing cryptocurrency wallet data, hijacking online accounts, harvesting browser-stored credentials, and deploying a crypto miner on infected systems.
Researchers warn that the campaign blends social engineering with legitimate-looking distribution platforms, making it particularly effective against users searching for unofficial gaming tools.
Context
Malware targeting gamers is not new, but financially motivated campaigns have increasingly shifted toward cryptocurrency theft.
Gaming communities are frequently targeted due to their high software download volume, reliance on third-party tools, and overlap with crypto-savvy users. Attackers exploit this behavior by disguising malware as performance enhancements, mods, or early access tools, relying on users to manually execute the payload.
This campaign reflects a broader trend: infostealers evolving beyond simple credential theft to include wallet harvesting, session hijacking, and persistent monetization through crypto mining.
What Happened
Researchers at Kaspersky discovered Stealka while investigating malware distributed through gaming-related downloads.
The malware is disguised as cracks, cheats, or mods and is hosted across multiple platforms, including GitHub, SourceForge, Softpedia, and Google Sites.
In some cases, attackers create professional-looking fake websites. In others, poorly designed pages are used, often relying on search engine traffic and popular keywords to attract victims. Execution is user-initiated, meaning the malware activates only after the downloaded file is manually run.
Technical Breakdown
Stealka functions as a multi-purpose infostealer with several data-harvesting capabilities.
It targets browser extensions associated with cryptocurrency wallets, including MetaMask, Trust Wallet, Exodus, and others. Wallet configuration files may contain encrypted private keys, seed phrase data, file paths, and encryption parameters.
The malware also extracts credentials from password managers, two-factor authentication tools, autofill databases, cookies, and active session tokens. In addition, Stealka can deploy a crypto miner, allowing attackers to generate ongoing revenue from infected devices.
Access to session tokens enables account takeover without requiring passwords, effectively bypassing 2FA protections.
Impact Analysis
The impact of Stealka extends beyond cryptocurrency theft.
Compromised credentials and session tokens can lead to full account hijacking across email, gaming, financial, and cloud services. For gamers, this may include loss of in-game assets or platform access. For crypto users, wallet compromise can result in irreversible financial loss.
The malware’s ability to affect over a hundred browsers significantly increases the potential attack surface, especially for users who rely heavily on stored autofill data.
Why It Matters
This campaign highlights the risks of combining unofficial software downloads with sensitive digital assets.
As cryptocurrency adoption grows, malware authors are increasingly targeting wallet infrastructure rather than traditional banking credentials. The use of trusted platforms and search-engine manipulation further erodes the effectiveness of basic user trust signals.
For individuals, this reinforces the importance of software hygiene. For defenders, it underscores the need for better visibility into user-initiated execution risks.
Expert Commentary
Kaspersky researchers emphasized that wallet configuration data alone can be sufficient to attempt cryptocurrency theft, even if private keys are encrypted.
They also noted that access to cookies and session tokens allows attackers to bypass authentication safeguards entirely, making traditional password security insufficient once a system is compromised.
Key Takeaways
Stealka is a new infostealer targeting gamers and crypto users.
It is distributed via fake game cracks, cheats, and mods.
The malware targets crypto wallet browser extensions and configurations.
Session token theft enables account takeover without passwords.
Victims must manually execute the malicious file.
Trusted hosting platforms are being abused for distribution.
Crypto losses from wallet compromise are typically irreversible.

