cross-posted from: https://programming.dev/post/37902936

For anybody wondering what is going on with $CANCER live stream… my life was saved for whole 24 hours untill someone tuned in my stream and got me to download verified game on Steam

After this I was drained for over 32,000$ USD of my creator fees earned on pumpdotfun and everything quickly changed. I can’t breathe, I can’t think, im completely lost on what is going to happen next, can’t shake the feeling that it is my fault that I might end up on street again or not have anything to eat in few days… my heart wants to jump out of my mouth and it hurts.

I won’t rewatch this myself but I have added a clip from the stream after I noticed what has happened.

also I have succesfully (CTOed) my creator rewards and they have been redirected to safe device.

Source: rastaland.TV on X/TwitterPrivate front-end.

More context:

Yesterday a video game streamer named rastalandTV inadvertently livestreamed themselves being a victim of a cryptodraining campaign.

This particular spearphishing campaign is extraordinarily heinous because RastaLand is suffering from Stage-4 Sarcoma and is actively seeking donations for their cancer treatment. They lost $30,000 of the money which was designated for their cancer treatment. In the steam clip their friend tries to console them while they cry out, “I am broken now.”

They were contacted by an unknown person who requested they play their video game demo (downloadable from Steam). In exchange for RastaLand playing their video game demo on stream, they would financially compensate them.

Unfortunately, the Steam game was actually a cryptodrainer masquerading as a legitimate video game.

Video.

Source: vx-underground on X/TwitterPrivate front-end.

Source: ZachXBT on X/TwitterPrivate front-end.

Rastaland GoFundMe.

Comments
  • daniskarma@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 hours ago

    I’m not into crypto. But how can it being stolen just by reading some file in the computer? Isn’t the private key encrypted with some really secure password? It was stolen while the private key was being used?

    • Sonalder@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      59 minutes ago

      To keep it short there is two big families of wallets. Hot and cold wallet. Hot wallets are the one that got an internet connection wether it’s a constant one or periodically connecting. Cold wallets are never connected to the internet and often are dedicated hardware devices with the better ones having a Secure Element to store the private key or even sometimes sign transactions directly in it.

      Victims of this attacks were using hot wallet on a not-dedicated machine which is consider bad practice. Hot wallets have to be consider more like a physical wallets for daily spends and cold wallet being privilege for long-term saving and monthly or yearly transactions.

      I’m not an expert but desktop OS (especially Windows) are not as well contained than phone so I almost never use hot wallet on my computer. Often users are tricked to sign transactions to get stolen but I think if the wallet is unlocked a malware with the right privileges/permissions could easily steals money.

      by reading some file in the computer Aren’t Steam games always executable for Windows?

  • I Cast Fist@programming.dev
    link
    fedilink
    English
    arrow-up
    14
    ·
    edit-2
    3 hours ago

    The game in question, Block Blasters, which was free to play, has been removed from Steam, although it seems owners can still try to install it, but antivirus programs may block those attempts.

    The GData linked in the post shows that the game was released in July 31 and that the malware update came in August 30, adding a .bat and 2 .zip files within the Engine/Binaries/ThirdParty/Ogg directory. The zip files were password protected, which blocked scanning.

    The batch script checks first if the system is running only Windows Defender and does not have any of the listed AV products from AV_PROCESSES as a running process; if these criteria are met, the batch script unpacks the contents of the archive “v1.zip” (…) The script “1.bat” adds the destination folder of the executables found inside the “v3.zip” archive to the exemption list for Microsoft Defender Antivirus. [emphasis mine]

    So, yeah, it’s pretty clear how easily it went undetected by Steam, Windows Defender or any other antivirus program - malware inside a password protected zip. I suspect making something similar on Android wouldn’t be much harder, as an app or game that needs access to your internal storage isn’t “too weird”, like something that asks for some music to play in a stage.

    • pulsewidth@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      3 hours ago

      A password-protected zip file should have been flagged by Steam as suspect before they approved the update, its a very old and very common method for detection bypass.

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    8 hours ago

    I’ll be the asshole: why the fake money wasn’t immediately converted to real money giving directly the exchange address instead of a locally hosted wallet? Except bitcoin all the shitcoins are devaluating in real time

    • CrackedLinuxISO@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 minutes ago

      With meme coins, the liquidity is dogshit. There’s no real market for sale.

      If you sell the tokens piece-by-piece as you get them, you drive down the future price and might get less real money overall. Better to sell a big chunk at once.

      Also, not every exchange has a wallet/custody system. It’s entirely possible for direct p2p trades to happen without any intermediate transfers. I don’t know if pump.fun actually does this.

    • Sonalder@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      57 minutes ago

      Criminals are often not the most highly intellectual people on this planet…

  • nuggie_ss@lemmings.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 hours ago

    All the average gamer-intelligence in this thread is reassuring.

    Glad I still see no reason to take most of you people seriously on anything related to technology.

  • ibot@feddit.org
    link
    fedilink
    English
    arrow-up
    124
    arrow-down
    1
    ·
    1 day ago

    No discussion, it is super shitty that someone stole the money.

    But the real scandal is, that anybody needs to raise money, to get a cancer treatment.

  • skozzii@lemmy.ca
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    4
    ·
    1 day ago

    America is the only country where this could occur, look yourself in the mirror…

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    59
    ·
    1 day ago

    At this point people should not keep substantial amounts of crypto on their main PC anymore. Either get a hardware wallet or an old smartphone or other device to dedicate to that purpose and not install anything else on it.

    • otp@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      1
      ·
      21 hours ago

      This isn’t a problem of crypto being a scam. The scam was a video game in this case.

      If someone hides $30k in cash in their home, gets robbed, then the robber spends it all and dies penniless? The victim won’t get their money back. Same as this victim.

      That’d make cash just as much of a scam as crypto in these two scenarios.

      • 𝚝𝚛𝚔@aussie.zone
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        8
        ·
        13 hours ago

        If someone hides $30k in cash in their home, gets robbed

        That’s not really a comparable scenario though, is it? To be robbed of cash someone has to physically be in the same location, and physically remove an object from your safe keeping (be it a literal safe, or on your person)

        To steal crypto someone on the other side of the world can just be like “yo bro click this” and 18 seconds later its gone. Who was it? Who knows. Where are they? No idea! Not even a chance to yell out “omg help help someone help this guy is stealing my stuff” as they do it.

        As a side note, I’m not a “cash is king” type person anyway. I much prefer electronic transfers. I just prefer my electronic transfers to be real money handled by financial insitutions where its protected by laws, not magic beans.

        • daniskarma@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          2 hours ago

          You can definitely get your bank account emptied by just “clicking here”. Personally know people that suffered that. And depending on the bank they will refund or not. If they got away with being a user rampant error you will be on your own.

        • otp@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          1
          ·
          10 hours ago

          As others have described, people can steal money digitally the same way. Yes, real money is infinitely more trackable.

          That doesn’t mean crypto is a scam. It just means it’s not (as) trackable as traditional currencies.

          And I’m not a cryptobro or anything. I just don’t think cryptocurrencies are inherently “a scam”.

          • prole@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            2 hours ago

            Yes, real money is infinitely more trackable.

            This isn’t even true, unless you’re specifically talking about coins like Monero.

            If you think bitcoin is untraceable, then I’ve got a bridge to sell you

    • pulsewidth@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      11 hours ago

      It really isn’t. Scanning code for vulnerabilities should be at a very high standard for the dominant and most wealthy game platform on Earth.

      Very standard practice for malicious software scanning is to install the program in a virtual environment and then monitor its processes to see if it’s performing malicious activities: eg keylogging while a background process (eg alt-tabbed), or if it interacts with browser data (trying to get saved auth cookies or saved account info), running searches for strings that are common for crypto wallets, etc.

      Its entirely possible that Steam has dropped the ball in a big way here.

      I can only imagine the animosity in the comments if it was from a game on the Epic store or Ubisoft UPlay…

      • DreamlandLividity@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        7 hours ago

        There are so many ways to bypass what you describe, in addition to it not working for games with kernel anti-cheat etc.

        The real issue is all desktop OSes deciding everything should be allowed to access everything. Why is a game able to access your crypto wallet by default, without any permission required? Why can a fake pdf access browser cookies? This has been solved on phones for years.

        • pulsewidth@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          And there are so many ways to detect the bypasses. It’s an arms race, and the most profitable games store of all time should really have a cutting edge system to deal with it is all I said.

          Windows should have better security too, but the two thoughts can be held in the mind at the same time.

          • DreamlandLividity@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            2 hours ago

            Well, I just disagree with you. IMO, they are a game distribution company, not a security company. I don’t see this as their job and I am not willing to pay more for games to have some far from perfect behavior scanning.

            PS: That is not to say Steam should do nothing, just not behavior analysis, which is an unnecessarily difficult and expensive measure to implement and operate.

            • pulsewidth@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 hours ago

              Who said you need to pay more for games? Steam already takes thirty percent of sales (for the vast majority of sales), they are a $10b+ game distribution company… They’re worth more than several leading security/antivirus companies combined.

              I just don’t understand the mindset people get around Steam. They are a business that makes a fortune distributing games, run by a billionaire - they are not a little indie company struggling under the weight of their success.

              • DreamlandLividity@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                1 hour ago

                And I don’t get the mindset of large company should do things for free. Valve is using the 30% to distribute games, provide backups for saves, run steam workshop, make games playable on Linux, creating the steam framework for games, and more. And of course keeps some of it as profit. Being a large company does not give you infinite resources. If they invest massive effort into some behavior analysis stuff, either they increase prices or cut something else they are doing.

                • pulsewidth@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 hour ago

                  All they’re expected to do is pay for upstream providers to scan their submissions (eg third party security providers), no need to hire new staff. This is the fourth instance publicized this year! They should communicate regarding issues like OPs - but like usual, it’s crickets.

      • ryathal@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        3 hours ago

        Steam does scan for malware, which is why this is news. It’s notable that a game got through that was malware. You haven’t heard about other stores because it’s not worth the effort in targeting them. I wouldn’t be surprised to learn that most stores use the same vendor for malware scanning.

        • pulsewidth@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          I didn’t say they dont scan for malware, I said it “should be to a very high standard”, fully understanding they already do.

          • ryathal@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            2 hours ago

            It is to a very high standard. There’s been 14k games released this year alone which would be a .01% miss rate for malware games. If you compare against all games to account for updates that add malware after submission it’s basically 0 at .000001%

            • pulsewidth@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 hour ago

              They’ve already missed four instances of malware this year that have been publicly reported. How many have other storefronts missed?

              I don’t see why asking them out to improve is an unbalanced response or unfair, given the enormous budget they have and the market dominance.

      • Wispy2891@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        8 hours ago

        It’s trivial to detect running in a vm and behave differently

        It’s more like “why the industry standard to allow games installers to run as admin is widely accepted?”

        Or “why a crypto wallet needs to have unencrypted files in the user home, ready for exfiltration?”

        • pulsewidth@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          3 hours ago

          Its also trivial for apps detecting any trivial attempts at scanning if they’re running in a VM to be detected, and masked.

          Those are also valid concerns, but in an environment where admin rights are granted to games installers the vendor of the games (Steam) needs to adopt a highly curated and protective stance. To this date they provide zero details of their protection - their entire FAQ on malware on their store boils down to ‘if you find malware, please flag it on the store page for us to investigate’.

          If anyone is gonna claim the steam store is highly curated… I’d point out to them that a very large amount of their store is shovelware asset flips with very few purchases and installs. There are over 150,000 games on Steam, and tens of thousands of them would fall into that category.

      • Nibodhika@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        8 hours ago

        And it is very easy to detect you’re in a virtual environment and not do those things, or have a date to trigger the changes or something. The game had been out for a while when this happened without any issues. I just dug a little bit and it was opening a back door apparently, so as long as the attacker did nothing at that time it would have been impossible to detect. You had to know that it was malicious to look for it, then it was quite obvious, but with Valve needing to vet millions of games it’s not feasible to do a full scan of every update of every game.

        • pulsewidth@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          Its “not feasible to do a full scan of every update of every game”?

          My friend the scans are automated. Is Steam strapped for cash this month?

          Honestly the apologia here for Steam is pretty rank.

          • Nibodhika@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            2 hours ago

            No automated scan would have captured this, only a paid professional dedicating some time would (and only because this was an obvious attempt, a more subtle one would go unnoticed even by an expert) and that is not feasible.

    • lazynooblet@lazysoci.al
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      8
      ·
      edit-2
      1 day ago

      If it’s true that the malicious game has been available for a month then steam has some blame.

        • kbobabob@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          24
          arrow-down
          2
          ·
          1 day ago

          Obviously, Steam is supposed to vet the source code of every game thoroughly before it ever gets put up for sale.

          • pulsewidth@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            3 hours ago

            Dumb take. There are many ways to scan software without needing access to the source code.

            Do you think retail antivirus providers approach every developer of every program version to request a copy of their source code for review before they can verify it’d safe?

            • KuroiKaze@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              16
              ·
              18 hours ago

              It’s not sarcastic. That’s exactly how most of these platforms work behind the scenes. They run automated, dynamic and static analysis against all the app code looking for potentially harmful signatures.

              • Nibodhika@lemmy.world
                link
                fedilink
                English
                arrow-up
                4
                ·
                8 hours ago

                That’s not analyzing the code. Also almost assuredly steam does that. Finally that wouldn’t catch this since it was a back door, as long as the attacker didn’t use it it would not be detected by any automated means.

              • AwesomeLowlander@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                14
                arrow-down
                3
                ·
                18 hours ago

                Pretty sure Steam already does that. And no automated (or even manual) analysis is going to be 100% foolproof, or we wouldn’t be worrying about supply chain attacks in Linux. So that puts us back at square one.

                • KuroiKaze@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  arrow-down
                  1
                  ·
                  17 hours ago

                  Yeah that’s literally what I said. Seems like the previous guy didn’t understand that. I don’t know why anyone would downvote me for just explaining how it works.

        • Modern_medicine_isnt@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          12
          ·
          24 hours ago

          Steam could easily gave automation the installs and runs games in a sandbox. Then watches what they do. The things it needed to do to steal the crypto should be vastly different than what a game should be allowed to do.

          • ryathal@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            4
            ·
            3 hours ago

            Malware creation and detection are billion dollar industries playing an eternal cat and mouse game with each other. These programs don’t just instantly try to steal every file the second they run.

            • Modern_medicine_isnt@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              39 minutes ago

              I am decently versed in the game of cat and mouse. The fact is, valve could do it. It is just somewhat expensive. Make a law that game distributors are liable for losses if they distribute malware and you would see how well they could do it.

            • pulsewidth@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 hours ago

              It had a password protected zip file in an update that hid the payload. That is pretty damn basic and would not have gotten past any retail antivirus program’s heuristic detection.

              Chances are that Valve is treated as a ‘trusted publisher’ by Microsoft Defender and thus it bypassed the scan. The malware even payload explicitly checks that no retail antivirus was installed, and that Microsoft Defender was active, prior to attempting to extract and run its payload.

              (See comments about for explicit details regarding the malware)

              • Nibodhika@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 hours ago

                Password protected zip file is also a way to deliver content an indie dev might use to lock content, so that on its own is not enough, but also the “payload” was connecting to a remote server, which is not indication of bad behavior, lots of games connect to remote servers and receive commands from there, e.g. event X starts now, or something. Except in this case it allowed a reverse shell.

                • pulsewidth@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 hour ago

                  Citation please for any indie dev using passworded zip files to lock game content. That would be a pretty dumb approach given all retail security suites / antiviruses will flag a password-protected archive as suspect by default (because they’re so commonly used in the past to distribute malware).

          • Die4Ever@retrolemmy.com
            link
            fedilink
            English
            arrow-up
            14
            ·
            20 hours ago

            There are so many ways malware could get through that. What if it waits for a specific date or a certain amount of progress in the game? This automated sandbox probably wouldn’t be smart enough to beat the game, certainly not with as many games as they have.

            • Modern_medicine_isnt@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              36 minutes ago

              I chose not to spell out the full test. The fact is, valve could do it. It is just somewhat expensive. Make a law that game distributors are liable for losses if they distribute malware and you would see how well they could do it.

          • dafta@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            17
            ·
            24 hours ago

            This isn’t foolproof. A lot of malware these days is resistant to analysis because they can detect that they’re running in a sandbox and refuse to run the malicioua code.

            • Modern_medicine_isnt@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              36 minutes ago

              I chose not to spell out the full test. The fact is, valve could do it. It is just somewhat expensive. Make a law that game distributors are liable for losses if they distribute malware and you would see how well they could do it.

          • dogs0n@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            6
            ·
            20 hours ago

            It isn’t easy as you say.

            If they could let us run games in a sandbox/virtualised area that would be amazing though. That’s a very big ask though.

            I do know that xbox consoles run games in their own hyper-v vm which gives extra protections to us from most malicious code.

            Obviously this would be hard for Steam to implement, but it would be a very nice measure.

            • Modern_medicine_isnt@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              35 minutes ago

              I didn’t say it was easy. The fact is, valve could do it. It is just somewhat expensive. Make a law that game distributors are liable for losses if they distribute malware and you would see how well they could do it.

  • rbesfe@lemmy.ca
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    18
    ·
    edit-2
    1 day ago

    Maybe don’t raise money for your cancer treatment in the form of crypto? Hard lesson to learn for sure

    • Katana314@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      1 day ago

      I don’t think it’s such a direct lesson since it could’ve been other financial information on there. Instead of a crypto key, the game could’ve installed a keylogger that read the player’s banking password later.

      It’s more of a general warning that Steam games are not necessarily safe.

      • kossa@feddit.org
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        7 hours ago

        Well, with my banking login the scammer could look at my balance and my poor spending habits. To withdraw/transfer they would need a TAN as well and therefore my banking card. Good luck getting hold of that with malware ¯\_(ツ)_/¯

        • Owl@mander.xyz
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 hours ago

          Depends on the bank

          Some bank give out that information if you login

  • ampersandrew@lemmy.world
    link
    fedilink
    English
    arrow-up
    148
    arrow-down
    3
    ·
    2 days ago

    This headline feels like a trap. Yes, Valve is the arbiter of what passes through the Steam store. Part of that involves checking for malware which, while their record isn’t flawless, they’ve let very little of it through given the sheer volume of games published to Steam every year. The consequences were terrible here, and I hope that can be rectified somehow. But the implication of this is that Valve makes this sort of error all the time through their “incompetence”, which they don’t, and the point of phrasing it this way seems to be to call anyone stating otherwise some kind of defender of a multibillion dollar company. It seems like a far better use of everyone’s time to be mad at the scammer here. Supporting and profiting from child gambling via Counter-Strike is a much better reason to be mad at Valve than the mistakes or other gaps in their vetting process that will be slightly tighter as a result of this mishap.

    • pulsewidth@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 hours ago

      Well since Steam provide absolutely zero details about their scanning process (or even if it exists), seems like conversely people are making a lot of really complementary assumptions about Steam, no?

      This is certainly not the first malware distributed by Steam - this is in fact the fourth publicly-known instance just this year.
      Seems like they need to step up their game if you ask me.

      • YellaLeber@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 hour ago

        Almost 14 thousand games released this year on steam. You could say malware is 100x more likely than the 4 publicly known instances you mention and that’s still not even 3% of games released. Steam is responsible but I don’t know how you expect them to get that down 0% besides manually reviewing game code line by line, which would probably destroy the platform. Don’t let perfection be the enemy of good

        • pulsewidth@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          35 minutes ago

          Good it is not when the recommendation from security experts and reporters is to avoid any Steam games with low numbers of installs / reviews and betas from small companies. That’s where we’re at now.

          https://www.bleepingcomputer.com/news/security/verified-steam-game-steals-streamers-cancer-treatment-donations/

          Nobody reviews game code, as game code is not supplied, only binaries with their relevant resources. There are many security providers that would be able to provide better service that whatever Valve is doing - but who knows, because they keep tight-lipped about it every time there’s an issue, and just patiently await their defenders to hand-wave any concerns.

          • YellaLeber@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            17 minutes ago

            Lmao well I don’t know what you want. If you want your PC to be secure, don’t use the Internet. You can’t expect every piece of software you come across to be perfectly vetted. In an ideal world sure everything would be foss and peer reviewed but that sure as hell ain’t the world we live in.

      • ampersandrew@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        Reporting from outside sources has covered what Steam’s vetting process is. They check to see if the game runs, if it has the features that the publishers/developers claim it has on the side bar, and they check for malware. Often times this is outsourced, but the buck does stop with Valve. The thing with any security measure though is that anything can be circumvented, and preventing the same vector of attack in the future is an arms race. And another way to read what you said about how many instances of malware there are is that it affects 0.02% of games released this year so far, and they’re not the games that customers are most likely to buy in the first place like your Borderlands or Battlefields.

    • over_clox@lemmy.world
      link
      fedilink
      English
      arrow-up
      35
      arrow-down
      6
      ·
      edit-2
      2 days ago

      Jerboa developers, may I kindly ask for an option to disable automatic video preview?

      Don’t get me wrong, it’s a nice feature and all, but fuck it eats at my limited cellular data usage and eats my battery…

      Edit: That was meant to be a top level comment, my bad. Leaving it though.

    • ms.lane@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      4
      ·
      23 hours ago

      I would have agreed a year ago.

      But the only clearing houses for online transactions turned out to be a bunch right wing stooges that hate LGBT and Adult Games.

  • HeyJoe@lemmy.world
    link
    fedilink
    English
    arrow-up
    31
    arrow-down
    13
    ·
    2 days ago

    With how much money valve makes, just fix it. Its nothing to them and makes them look good.

    • AwesomeLowlander@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      40
      arrow-down
      2
      ·
      edit-2
      1 day ago

      Incentives. If valve did this, the expectation would be for them to cover any and all future breaches. They don’t have the capability of detecting and preventing all attempts, and this would incentivise a wave of new malicious programs. Because hey, if you get one into the store, you can now steal a million bucks from your own sockpuppet account, and valve will cover it.

    • MyDarkestTimeline01@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      7
      ·
      edit-2
      2 days ago

      Honest to God, this is a PR slam dunk if they do that. They get to write if the pay out as a donation to charity for tax purposes, get the lime light of them doing something generous for a cancer patient, and can show that they take the few breeches of their malware.qall seriously. Hell they could probably double the pay out and they wouldn’t even notice the loss.