Home » Technology » Games » Increased playedemo advertised via Steam

Increased playedemo advertised via Steam

Again, a dangerous malware attack on Steam users becomes known. Disguised as a harmless game demo, “Sniper: Phantom’s Resolution” spreads malware over external downloads. Perfide: the malware bypasses Windows security systems.

Dangerous malware disguised as a game demo

Steam users currently have to be particularly vigilant. After the PirateFi incident in February, another game was discovered again, the malware is spreading, even if this time only indirectly. It is about the title “Sniper: Phantom’s Resolution” from the alleged developer Sierra Six Studios. The game noticed through several suspicious characteristics.

Instead of offering the demo directly via Steam, interested players were directed to an external website. From there, a link led to a Github repository with the supposed game demo. Particularly striking: The developers even warned of downloads outside of Steam – although the demo was not at all – was available in the Steam store, unlike “Piratefi”. Steam Spring Sale 2025: Official trailer

Sophisticated camouflage methods of the malware

The Online magazine The Gamer reported the case last week and referred to users who were at Had exchanged Reddit about it. Accordingly, the installer of Sniper demo contained various harmful components. The main file bore the suspicious name “Windows Defender SmartScreen.exe”. Analyzes by Reddit users showed that the malware achieved administration privileges and dealt with Windows encryption.

The malware was designed in such a way that it was not recognized by common virus scanners. There were also a few more abnormalities that made the profile of the provider and the Steam side of the game appeared as a suspect.

Athletic signs at a glance:

  • Advertising assets from other games
  • A recently registered domain of the developer
  • Suspicious discord messages with advertising for the game
  • A github profile with a focus on cryptocurrency tools

Fast reaction from Valve and Github

According to user reports, Github immediately removed the harmful repository. Valve also acted quickly and took the game out of the store. In addition, the website of the alleged developers is now offline. Affected users should uninstall the game and thoroughly check their systems for malware.

The incident shows that even official platforms such as Steam can be misused for the spread of malware. Particular caution is required when games refer to external download sources. Users should generally be skeptical when downloads are offered outside the Steam platform or developers have only recently been active.

Leave a Reply