Compartir este artículo

Call of Duty Cheaters Allegedly Lose Their Bitcoin as Hackers Target Gamers With Malware

The malware has already impacted hundreds of thousands of players and the numbers are still growing, as per malware market informer @vxunderground.

Actualizado 29 mar 2024, 6:42 a. .m.. Publicado 29 mar 2024, 6:40 a. .m.. Traducido por IA
Call of duty gamers are targeted for their bitcoin. (Fábio Magalhães/Unsplash)
Call of duty gamers are targeted for their bitcoin. (Fábio Magalhães/Unsplash)
  • A mysterious group of cybercriminals has released an infostealer targeting gamers who cheat in video games, stealing their bitcoin holdings and impacting hundreds of thousands of players.
  • Game developer Activision Blizzard is working with cheat providers to help the affected players.

Video game cheaters may have finally met their match as a mysterious group of cybercriminals has reportedly released an information stealer malware targeting gamers who cheat in Call of Duty, stealing the bitcoin holdings of some players.

The malware has already impacted hundreds of thousands of players and the numbers are still growing, as per malware market informer @vxunderground.

STORY CONTINUES BELOW
No te pierdas otra historia.Suscríbete al boletín de The Protocol hoy. Ver todos los boletines

“It should be noted that some of these accounts are also not cheaters,” @vxunderground added. “Some users impacted utilized gaming software for latency improvement, VPNs, and certain controller boosting software.”

Call of Duty cheat code provider “PhantomOverlay” was first to notice the suspicious activity after users reported unauthorized purchases. Rival cheat providers like Elite PVPers confirmed similar attacks to @vxunderground in the past week.

The stolen data includes freshly stolen credentials, with some victims also reporting their Electrum wallets were also drained. The total amount of crypto stolen is still unknown.

Call of Duty developer Activision Blizzard (ATVI) is reportedly working with the cheat code providers to help the affected players. The current estimated number of compromised accounts includes over 3.6 million Battlenet accounts, 561,000 Activision accounts, and 117,000 Elite PVPers accounts.

Meanwhile, PhantomOverlay claimed the number of hacked accounts “are inflated” in a Telegram broadcast message on Wednesday.

Exploiters have targeted game cheaters for years. In 2018, a supposed cheat for the massively popular video game Fortnite turned out to be malware designed to steal bitcoin wallet login details. Fortnite players were again targeted in 2019, with hackers blocking access to a user's entire computer data.



More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

New React bug that can drain all your tokens is impacting 'thousands of' websites

Hacker sitting in a room

Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.

What to know:

  • A critical vulnerability in React Server Components, known as React2Shell, is being actively exploited, putting thousands of websites at risk, including crypto platforms.
  • The flaw, CVE-2025-55182, allows remote code execution without authentication and affects React versions 19.0 through 19.2.0.
  • Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.