The Hidden Danger in Your Gaming PC: PH ranks #2 in APAC for compromised gaming accounts— Kaspersky reveals

Kaspersky reveals 11M gaming accounts leaked in 2024, with APAC gamers hit hardest. Learn the risks and how to protect your accounts.
0

Kaspersky’s latest research reveals a shocking 11 million gaming account credentials leaked in 2024 — including 5.7M Steam accounts compromised by infostealer malware. APAC gamers were hit hard, with the Philippines ranking second highest at 93,000 stolen login-password pairs.

The threat doesn’t stop at the gaming world — corporate security is at risk too, as some leaked accounts were registered with work emails, opening the door for targeted attacks. With APAC’s gaming community now nearing 1.8 billion players, cybercriminals have more opportunities than ever to exploit this thriving scene.

Learn how these leaks happen, why they’re dangerous even years later, and how both gamers and businesses can defend against infostealers.


New threat research from Kaspersky Digital Footprint Intelligence (DFI) team reveals that 11 million gaming account credentials were leaked in 2024. The findings presented during Kaspersky’s Cyber Security Weekend in Da Nang, Vietnam, show that 5.7 million Steam accounts were compromised by infostealer malware in 2024. This notorious type of malware also led to leakage of 6.2 million accounts related to other global gaming platforms: Epic Games Store, Battle.net, Ubisoft Connect, GOG, and EA app.


Kaspersky Digital Footprint Intelligence analyzed leaked Steam credentials associated with APAC countries, based on data from malware log files. Nearly 163,000 leaked credentials were associated with Thailand, followed by the Philippines with 93,000 compromised login-password pairs. Vietnam rounded out the top three with nearly 88,000. In contrast, the lowest numbers were observed for accounts associated with China, Sri Lanka, and Singapore, with approximately 19,000, 11,000, and 4,000 credentials, respectively.


Kaspersky Digital Footprint Intelligence analyzed leaked Steam credentials in APAC Countries


The APAC region has firmly established itself as the global epicenter of gaming. According to a recent report, more than half of the world’s gamers are based here, with markets such as China, India, Japan, South Korea, and emerging Southeast Asian economies contributing to this dominance. The region’s rapid digital adoption, widespread mobile penetration, and youth-driven demand have fueled exponential growth across both casual and competitive gaming segments.


With close to 1.8 billion players and rising, the gaming ecosystem in APAC is not only the largest by volume but also among the most influential in shaping global gaming trends and behaviors. Thus, it does not come as a surprise that the region is fast-becoming a breeding ground for a data-stealing class of cyber threats.


“Cybercriminals often release stolen log files months — or even years — after the original compromise,” explains Polina Tretyak, a Digital Footprint Intelligence Analyst at Kaspersky. “Even credentials stolen years ago can resurface on dark web forums, contributing to a growing pool of leaked information. As a result, the number of compromised gaming accounts is likely much higher than what is immediately visible”.


She adds, “It’s important for people to understand that infostealer threats aren’t always instant or obvious. In case one suspects they have been attacked, running a security check and deleting a malware is a first recommended step. In general, regularly updating passwords an avoiding reuse across platforms can help reduce personal risk”.



How gaming threats may affect businesses – in APAC and beyond


Modern businesses may not consider themselves part of the gaming ecosystem, but they still can be in danger – for example, through employees registering on entertainment platforms using a corporate email address. Kaspersky Digital Footprint Intelligence study shows that 7% of Netflix, Roblox, and Discord users whose accounts were leaked registered there using a corporate email address.


The fact that employees may be using corporate emails to register for personal services, including games, introduces cybersecurity risks. Polina Tretyak noted that if the corporate email is exposed in an infostealer leak, it could potentially open the door to broader corporate threats. “For example, attackers may reach out to an employee and lure them into installing a malware on a corporate device or brute force the password. If the password uses predictable patterns — such as 'Word2025!', it may take just around an hour or less. Also, fraudsters may gain access to various non-corporate systems under employee accounts and retrieve some important data, as well as access the company’s resources”, elaborated Tretyak. 


Infostealers are often disguised as cracked games, cheat software, or unofficial mods. They are used by threats actors looking to steal sensitive information of any kind. Their primary target is account passwords, crypto wallet credentials, credit card details, and browser cookies. Once exfiltrated, the stolen data is traded or offered for free on darknet platforms, and may be used by other cybercriminals for further attacks.


Aside from the harm infostealers can inflict, this malicious package is particularly dangerous in hybrid and bring-your-own-device (BYOD) environments common across APAC, where personal and work-related activities often coexist on the same device.



How to build defenses against infostealers


If you as an individual encounter a data leak through infostealers, the following steps should be taken immediately:


  • Firstly, run full security scans on all devices, removing any detected malware.
  • Second step is changing compromised account passwords.
  • It is also recommended to monitor for suspicious activity associated with the accounts affected by infostealers.


Companies are recommended to monitor dark web markets proactively to detect compromised accounts before they pose risks to customers or employees. A detailed guide on setting up monitoring can be found here. Leverage Kaspersky Digital Footprint Intelligence to track what cybercriminals know about your company’s assets, identify potential attack vectors, and implement protective measures in a timely manner.


To know more about Kaspersky Digital Footprint Intelligence, visit www.dfi.kaspersky.com.

No comments

Post a Comment