Gaming as a hidden threat to corporate security: Flare report
News | 27.11.2025
The worlds of corporate security and online gaming intersect more often than we think. The latest research from our partner, Flare, sheds light on a worrying trend: gamers are becoming a priority target for cybercriminals, which in turn creates huge risks for employers.
Alarming statistics
Flare analysts discovered that 41% of all infostealer malware logs available on the Dark Web contain credentials linked to gaming services. This includes platforms such as Steam, Roblox, Epic Games, and others.
Cybercriminals exploit the popularity of video games and user trust in modifications (mods) and cheat codes to distribute malicious software.
Mechanics of an attack on business
Why should this concern an IT Director or CISO? The problem lies in the blurring of personal and professional digital spaces. Employees often use the same devices for work and entertainment, or save corporate passwords in browsers where they are also logged into gaming accounts.
When a device gets infected through downloading a "pirated" game or mod, Infostealer malware steals more than just gaming skins or currency. It siphons everything: saved CRM passwords, VPN access, Slack sessions, and corporate email.
Threat vector analysis
Risks for the gamer (employee)
- Infection source: Downloading free cheat codes, mods, or pirated game versions.
- Losses: Stolen gaming accounts, digital assets, personal financial data.
Risks for the company (employer)
- Invisible threat: Corporate antivirus may miss a threat on an employee's personal device (BYOD).
- Consequences: Compromised corporate accounts (SSO), data leaks, ransomware attacks.
How to protect yourself?
Companies need to realize that employee security outside the office directly impacts the organization's security perimeter. Flare solutions provide Continuous Threat Exposure Management (CTEM), allowing you to detect credential leaks before they are used to breach the corporate network.
Softprom is the official distributor of Flare. We will help you set up effective monitoring and protect your digital assets.
Want to know if your corporate data is in stolen logs? Contact Softprom for a consultation and a demo of the Flare solution.
More information about Softprom.