A big-scale malware marketing campaign particularly targets Minecraft gamers with malicious mods and cheats that infect Home windows units with infostealers that steal credentials, authentication tokens, and cryptocurrency wallets.
The marketing campaign, found by Verify Level Analysis, is performed by the Stargazers Ghost Community and leverages the Minecraft huge modding ecosystem and legit companies like GitHub to achieve a big viewers of potential targets.
Verify Level has seen hundreds of views, or hits, on Pastebin hyperlinks utilized by the risk actors to ship payloads to targets’ units, indicating the broad attain of this marketing campaign.
Stealthy Minecraft malware
The Stargazers Ghost Community is a distribution-as-a-service (DaaS) operation lively on GitHub since final yr, first documented by Verify Level in a marketing campaign involving 3,000 accounts spreading infostealers.
The identical operation, which is boosted by faux GitHub stars, was noticed infecting over 17,000 programs in late 2024 with a novel Godot-based malware.
The most recent marketing campaign described by Verify Level researchers Jaromír Hořejší and Antonis Terefos targets Minecraft with Java malware that evades detection by all anti-virus engines.
The researchers discovered a number of GitHub repositories run by Stargazers, disguised as Minecraft mods and cheats like Skyblock Extras, Polar Consumer, FunnyMap, Oringo, and Taunahi.
“We now have recognized roughly 500 GitHub repositories, together with these which might be forked or copied, which had been a part of this operation aimed toward Minecraft gamers,” Antonis Terefos advised BleepingComputer.
“We have additionally seen 700 stars produced by roughly 70 accounts.”

Supply: Verify Level
As soon as executed inside Minecraft, the first-stage JAR loader downloads the following stage from Pastebin utilizing a base64 encoded URL, fetching a Java-based stealer.
This stealer targets Minecraft account tokens and person knowledge from the Minecraft launcher and widespread third-party launchers like Feather, Lunar, and Important.
It additionally makes an attempt to steal Discord and Telegram account tokens, sending the stolen knowledge through HTTP POST requests to the attacker’s server.
The Java stealer additionally serves as a loader for the following stage, a .NET-based stealer referred to as ’44 CALIBER,’ which is a extra “conventional” data stealer, trying to grab data saved in net browsers, VPN account knowledge, cryptocurrency wallets, Steam, Discord, and different apps.

Supply: Verify Level
44 CALIBER additionally collects system data and clipboard knowledge and may seize screenshots of the sufferer’s laptop.
“After deobfuscation we are able to observe that it steals varied credentials from browsers (Chromium, Edge, Firefox), information (Desktop, Paperwork, %USERPROFILE%/Supply), Cryptocurrency wallets (Armory, AtomicWallet, BitcoinCore, Bytecoin, DashCore, Electrum, Ethereum, LitecoinCore, Monero, Exodus, Zcash, Jaxx), VPNs (ProtonVPN, OpenVPN, NordVPN), Steam, Discord, FileZilla, Telegram,” warns the researchers.
The stolen knowledge is exfiltrated through Discord webhooks, accompanied by Russian feedback. This clue, mixed with UTC+3 commit timestamps, means that the operators of this marketing campaign are Russian.
Verify Level has shared the total indicators of compromise (IoCs) on the backside of its report to assist detect and block the risk.
To remain protected towards this and comparable campaigns, Microsoft gamers ought to solely obtain mods from respected platforms and verified group portals and stick with trusted publishers.
If prompted to obtain from GitHub, test the variety of begins, forks, and contributors, scrutinize commits for indicators of faux exercise, and test current actions on the repository.
Finally, it’s prudent to make use of a separate “burner” Minecraft account when testing mods and keep away from logging into your predominant account.
Patching used to imply complicated scripts, lengthy hours, and limitless fireplace drills. Not anymore.
On this new information, Tines breaks down how fashionable IT orgs are leveling up with automation. Patch quicker, cut back overhead, and concentrate on strategic work — no complicated scripts required.