Tuesday, April 15, 2025
HomeAndroid250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Published on

SIEM as a Service

Follow Us on Google News

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very well-liked among gamers who use cryptocurrencies because of the potential rewards of a brand-new cryptocoin that the developers intend to launch. 

The game’s success has spawned numerous copycats with similar names, icons, and gameplay mechanics. While these imitations appear benign, they aim to profit from in-app advertising. 

The popularity of Hamster Kombat has created openings for cybercriminals. Fake app stores target Android users, offering malware disguised as the game that bombards them with ads.

- Advertisement - Google News

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Windows users are at risk from GitHub repositories distributing malicious farm bots and auto-clickers laced with Lumma Stealer malware for credential theft.  

 In-game screenshot of Hamster Kombat

Researchers discovered malware distributed through unofficial channels, including fake Hamster Kombat apps and game automation tools that actually steal user information, targeting both Android and Windows devices, highlighting the risks of downloading apps from unofficial sources. 

The game’s token, HMSTR, will be distributed on The Open Network (TON) based on in-game performance metrics like profit per hour, unlike Notcoin’s airdrop, which rewarded total score, emulating Notcoin’s successful token launch on TON in May 2024 and aiming to replicate its achievement in the crypto-gaming space. 

It has been found that Android malware, including spyware (Ratel) and fake app stores with unwanted ads, might encounter repositories containing Lumma Stealer cryptors.

While the game itself seems safe, cybersecurity experts warn of potential financial risks associated with “play-to-earn” mechanics. 

Malicious Hamster Kombat access requests

ESET researchers discovered Ratel, an Android spyware disguised as Hamster Kombat, on Telegram, which steals notifications and sends SMS messages to steal money from the victim. 

It hides notifications from over 200 apps to prevent the victim from discovering suspicious activities. Ratel also communicates with a C&C server to receive instructions and potentially upload intercepted notifications.  

Notification exfiltrated to C&C server

Hamster Kombat, a popular Telegram clicker game with a promised cryptocoin, has attracted malicious actors, while Android spyware Ratel disguised as Hamster Kombat on Telegram steals notifications and sends SMS messages. 

Fake app stores impersonating legitimate ones also deliver unwanted advertisements.

For Windows users, GitHub repositories offering farm bots and autoclickers contain Lumma Stealer malware, which steals cryptocurrency wallets, user credentials, and other sensitive information.

Fake websites impersonating an app store interface

Lumma Stealer malware uses different encryption methods for C++, Go, and Python applications.

The C++ variant embeds RC4 encrypted Lumma Stealer and injects it into RegAsm.exe.

The Go variant uses AES-GCM encryption and leverages obfuscated code from go_libpeconv to perform process hollowing. 

The Python variant presents a fake installer, downloads a password-protected archive containing a cryptor with Lumma Stealer upon user consent, and sends timestamps to a C&C server that likely forwards the data to the operators’ Telegram account.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...