BlockBlasters Crypto Theft Scandal: $32,000 Drain from Streamer Raises Security Alarm in Gaming Community

A verified game on Steam called **BlockBlasters** has become the center of a major crypto theft scandal after it was used to drain over $32,000 in cryptocurrency from a popular gaming streamer, Raivo Plavnieks, also known as RastalandTV. Plavnieks, who was hosting a live fundraising stream for cancer treatment, downloaded BlockBlasters during his broadcast only to have his crypto wallet targeted and emptied by malware embedded in the game.
BlockBlasters was originally a free-to-play 2D platformer released by Genesis Interactive, attracting hundreds of positive reviews and appearing safe for nearly a month after its launch. However, on August 30, a critical update introduced a **cryptodrainer component** that quietly began stealing credentials and digital assets from unsuspecting players. The attack was quickly discovered but not before Plavnieks lost vital funds intended for his medical care. In response, the gaming and crypto communities rallied, with influencer Alex Becker sending replacement funds to help Plavnieks recover from the loss.
Security investigations have revealed that the BlockBlasters malware targeted users managing significant crypto holdings, often identified through social media before being invited to try the game. The malicious code harvested sensitive data including Steam login credentials and cryptocurrency wallet information, uploading the stolen assets to servers controlled by attackers. Researchers traced the infection to a batch script that checked the victim’s system and initiated extensive data collection.
The impact of the BlockBlasters campaign extends far beyond a single individual. Reports estimate up to **$150,000 stolen from at least 261 accounts**, with some sources suggesting nearly 500 victims may have been affected. Security groups have issued public warnings urging all users of BlockBlasters to reset their Steam passwords and transfer their crypto assets to new, secure wallets. Technical analysis has further detailed how the malware works—using remote-control backdoors and info-stealing payloads to evade detection and maximize its haul.
This incident serves as a reminder to the gaming community to exercise caution when downloading games—even verified titles—from online platforms. Games with few downloads and reviews, or those in beta development, may harbor hidden threats. If you installed BlockBlasters or notice unusual activity after playing new Steam releases, immediate action like password resets and transferring digital assets is strongly advised to protect against future attacks.
Leave a Comment