A Fake Game Download Destroys a Singaporean Entrepreneur’s Whole Crypto Portfolio

0
image shows fake game downloadss

A Singapore-based businessman lost his entire digital asset portfolio after installing a fake game, serving as a sobering reminder to the world’s cryptocurrency community about how sophisticated user protections and traditional cybersecurity technologies can be circumvented by contemporary malware.

The victim, Mark Koh, the creator of the cryptocurrency fraud victim-support website RektSurvivor, claimed that when he inadvertently launched a fraudulent game launcher posing as a genuine Web3 project, attackers depleted all of his cryptocurrency holdings.  Importantly, Koh said that he did not open or log into any wallet during the attack, highlighting how sophisticated the hack was.

How the Attack Began?

Koh claims that the incident began on December 5 when he came across a Telegram beta-testing opportunity for an online game called MetaToy.  The project seemed legitimate:

  • A website with expert design.
  • A vibrant Discord community.
  • Quick communication from those posing as team members.

Koh said there were no immediate warning signs based on his experience assessing early-stage Web3 initiatives.  He then downloaded the MetaToy game launcher to his PC.

Malware Detected—but Too Late

The Norton antivirus program detected questionable behavior on Koh’s system shortly after installation.  Moving quickly, he:

  • Completed system scans.
  • Deleted registry entries and files that were flagged.
  • Completely reinstalled Windows 11.

The damage has already been done in spite of these efforts.

All cryptocurrency held in wallets linked by the Phantom and Rabby browser extensions was removed in less than a day.  Over the course of eight years, Koh lost nearly $14,189 (about ₹11.8 lakh/100,000 yuan) in assets.

Koh remarked, “I didn’t even open my wallet or approve any transactions.”  Nothing was digitally stored.  I employed distinct seed phrases.

Why This Attack Is Particularly Alarming?

The incident, according to cybersecurity specialists, is an example of a new generation of cryptocurrency theft methods that do not depend on phishing URLs, phony approvals, or user-initiated wallet transactions.

Koh believes the attackers employed a multi-layered vulnerability that included:

  • Theft of authentication tokens enables hackers to mimic wallet sessions.
  • DLL hijacking, two of which antivirus software supposedly prevented.
  • A potential zero-day vulnerability in Google Chrome that could allow for the silent execution of malicious code was revealed in September.

Koh thinks a scheduled malicious procedure was already entrenched in the system, enabling attackers to act later without setting off alerts, even though Norton prevented some components.

According to Koh, “this wasn’t basic malware.”  “It was layered, persistent, and built to withstand cleanup efforts.”

image shows Fake Game

Wallets Drained Without Direct Access

According to experts, these attacks can extract:

  • Browser-stored session tokens
  • Encrypted wallet credentials
  • Temporary authentication data

This makes it possible for criminals to empty wallets without the need for passwords, seed phrases, or user consent, particularly when browser-based hot wallets are involved.

According to reports, the MetaToy spyware collected this data covertly and carried out transactions from a distance.

Police Complaint Filed, Scam Still Active

The Singapore Police Force has acknowledged receiving Koh’s formal complaint.  Additionally, he has linked media and investigators to another victim in Singapore who was the target of the same MetaToy scam.

The second victim said that the fraudster is still in contact and doesn’t seem to be aware that the fraud has been discovered, which is concerning because it suggests the operation is still continuing strongly and actively pursuing new users.

Warning to Crypto Investors and Developers

Koh publicly warned cryptocurrency investors, developers, and angel investors—especially those who often test beta software—after the occurrence.

Important safety measures he emphasized:

  • Don’t store a lot of money in browser-based hot wallets.
  • Whenever feasible, use offline signing or hardware wallets.
  • Prefer private keys to wallets derived from shared seed phrases.
  • Even if a Telegram-based beta invite seems professional, proceed with extreme care.

“Every derived wallet falls if one seed phrase is compromised,” Koh said.

A Broader Pattern in Crypto Cybercrime

According to cybersecurity experts, this attack is part of a larger pattern of increasingly sophisticated malware with a crypto focus, which includes:

  • Fake AI tools and plugins
  • Malicious CAPTCHA pages
  • Trojanised developer extensions
  • Weaponised beta software

These attacks take advantage of Web3 ecosystems’ open testing culture, trust, and urgency.

Wrapping Up

Even seasoned users can lose everything with a single download, even if they don’t click on a malicious link or approve a transaction, as the MetaToy instance illustrates.

Cybercrime has evolved from simple fraud to sophisticated attacks that take advantage of operating systems, software, and browsers as the use of cryptocurrencies increases.

The lesson is obvious for the cryptocurrency community:

Security must now be integrated at the system level rather than relying solely on user awareness.

About The Author:

Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space.  Besides writing for the News4Hackers blogs, he also writes for brands including Craw Security, Bytecode Security, and NASSCOM.

Read More:

Espionage Malware Deployed by China-Aligned Threat Group Using Windows Group Policy

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish