
A free horror game on Steam turned into a real-world cybersecurity threat after a gamer discovered malware hidden within it.
Valve has since removed Beyond The Dark from Steam, but anyone who downloaded the game should immediately scan their system, change passwords and monitor cryptocurrency wallets for suspicious activity.
YouTuber Eric Parker says it targets browser data, saved credentials, and crypto wallet extensions such as MetaMask. Even worse, the malware continued to run in the background even after the game failed to launch
Users were quick to point out that the game originally existed on Steam under the name Rodent Race. A likely scenario is that the attackers hijacked the developer’s Steam account, renamed the game, replaced screenshots and pushed a malicious update.
The report also notes that the store page disclosed the use of AI-generated artwork that was later modified manually. Researchers suspect AI tools may have helped attackers quickly rebrand the hijacked title.
YouTuber Eric Parker investigated the game and published findings showing suspicious behavior linked to the file UnityPlayer.dll. The malware reportedly looked for browser-based cryptocurrency wallets, tried to steal saved browser credentials, connected to external servers to download additional tools and collected browser session information and wallet data.
This type of malware falls into a broader category known as “infostealers.” Cybercriminals increasingly distribute them through fake software installers, pirated applications, browser extensions and compromised gaming platforms.
While Steam remains relatively safe overall, this incident shows that no platform is immune to abuse.
Still, gamers should be careful when downloading new titles. They should check the publisher’s history, check the community, read the comments from other players, and use security solutions that can determine in real time if you’ve downloaded malicious code.
Anyone who downloaded or launched Beyond The Dark should treat the incident seriously and take the following steps:
According to reports, the game contained infostealer malware hidden inside a DLL file. Valve later removed it from Steam.
The malware allegedly targeted browser data, saved passwords, session information, and crypto wallets like MetaMask.
Delete the game, run antivirus scans, change passwords, and monitor wallets and online accounts for suspicious activity.
Yes. While rare, attackers can abuse compromised developer accounts or malicious updates to distribute malware through trusted platforms.
Gaming accounts often contain payment data, valuable digital items and access to cryptocurrency, making them attractive targets for cybercriminals.
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all posts