The Steam Gift Card Scam: What You Need To Know

The Steam platform is hugely popular among PC gamers, offering thousands of titles across various genres. Like most gamers, you likely fund your Steam wallet using gift cards for purchasing games and in-game items. Unfortunately, scammers are now leveraging Steam gift cards to defraud unsuspecting users.

This emerging scam involves messages promising free Steam gift cards to lure victims onto phishing sites designed to steal login credentials or distribute malware. With convincing messaging and legitimate-looking links, even savvy users risk falling for these criminal tactics.

This guide will explore this scam in detail, providing insights into how it works, who’s affected, and most importantly, how to steer clear of it.

3 1

An Overview of the Steam Gift Card Scam

In recent years, Steam gift card scams have emerged as a popular phishing tactic targeting the platform’s massive user base. This scam revolves around users receiving messages offering free Steam gift cards, typically $50 in value. The catch is that the links contained in these messages redirect to fraudulent websites designed to steal login credentials, payment information, or install malware.

With over 125 million users on Steam, scammers have a huge pool of potential targets for this scam. Anyone enthusiastic about Steam games and items is likely to be enticed by the prospect of getting a free gift card code. This enthusiasm makes it easier for scammers to bypass users’ skepticism.

The messages used in this scam are intentionally designed to appear credible. They often seem to come directly from Steam or a familiar contact on platforms like Discord. The phishing links are similarly crafted to closely resemble and mimic legitimate Steam domains. These tactics make it easier to fool even experienced Steam users into believing the offer is authentic.

For example, a user may receive a Discord message stating: “Here is a $50 Steam gift card code to celebrate our friendship! Claim it quickly before it expires here: steam-wallet-rewards[.]com.” While the message appears to be from a friend and the URL looks initially legitimate, it actually redirects to a fake phishing site to harvest login data.

In other cases, the scam starts with very believable social media ads promoting Steam gift card deals, such as “$100 Steam gift cards for just $80!” The listing convinces buyers to pay through QR code, gift card code, or cryptocurrency transfer. However, the discounted gift cards don’t exist, and buyers end up losing their money while scammers profit.

6

These tactics allow scammers to rake in money and sensitive personal data from Steam users. With access to Steam accounts, they can steal payment info, purchase games fraudulently, resell high-value inventory items, and spread their scam further by posing as friends. There are also indications compromised accounts get sold online.

Malware strains like Spyware, Trojans, and Keyloggers are often used in tandem with these phishing scams to extract additional data from infected devices. Once installed, this malware can monitor browsing activity, capture screenshots and credentials, or lock down access completely until a ransom is paid.

Ultimately, this scam preys on people’s desire for deals and virtual goods. But no matter how appealing a Steam gift card offer seems, it’s essential to exercise caution before clicking on links or providing any personal information.

How the Steam Gift Card Scam Works

The Steam gift card scam employs simple but effective social engineering tactics to reel in victims. Here is a step-by-step overview of how this scam unfolds:

Step 1 – Unsolicited Message Promising Free Gift Card

The scam starts with the victim receiving a message claiming to offer a $50 Steam gift card for free. This message typically arrives via gaming chat platforms like Discord, with the sender posing as a friend.

The offer seems credible since it appears to come from a familiar contact. The message contains a URL supposedly linking to a Steam store page for claiming the gift card.

Step 2 – Victim Clicks on Disguised Phishing Link

If the user clicks the link, it redirects to a phishing site impersonating a legitimate Steam page. The site resembles an official Steam login portal or gift card claiming page.

Hacked accounts are often used for propagating these messages to exploit user trust. The URLs also tend to mimic actual Steam sites using misspelled or slightly altered addresses.

Step 3 – Entering Login Credentials on Fake Sites

The fake Steam page prompts the user to sign in to claim their gift card. If victims enter their username and password here, the credentials immediately end up with the scammers running the phishing site.

In other cases, the site may attempt to trick users into downloading malware masquerading as a Steam extension required for the gift card. This malware then compromises the machine.

Step 4 – Account/Device Takeover and Spreading the Scam

With access to login details, the criminals can hijack Steam accounts, steal any stored payment information, and purchase games fraudulently. Compromised accounts also let them perpetuate the scam by sending out more fake gift card offers.

If malware infected the device, it can monitor activity, steal Steam credentials upon entry, and siphon other sensitive data. Occasionally, scammers also hold devices ransom by restricting access until a payment is processed.

Targets and Victims of the Steam Gift Card Scam

The Steam gift card scam casts a wide net, targeting Steam’s diverse 125 million-strong user base. Any Steam user is a potential target, although some demographics seem more susceptible. These include:

  • Younger gamers – Typically aged 13 to 25, younger Steam users tend to be less informed about cyber threats. Their enthusiasm to get something for free also overrides caution.
  • Newer users – Recent Steam joiners are less informed about past scams or phishing techniques targeting the platform. Long-time users are likelier to identify red flags.
  • Active social media users – Since social platforms are propagation vectors, users more active on sites like Discord are at higher risk of encountering scam messages or posts.
  • Auction/sale seekers – Scam gift card listings on sites like eBay or Craigslist entice those seeking discounted games or items. This demographic is also more open to alternative payment options like cryptocurrency.

Essentially, any Steam user hungry for a deal or lacking cybersecurity awareness could become ensnared by this scam. Vigilance and skepticism are critical, even when receiving offers from familiar handles.

What to Do If You Are a Victim of This Scam

Falling victim to the Steam gift card scam can compromise accounts, finances, and devices. If you suspect you’re affected, follow these immediate damage control steps:

1. Reset Your Steam Password

Your number one priority is regaining sole access to your Steam account. Change your password immediately using a different uninfected device to lock out scammers. Enable two-factor authentication for added security, if not already active.

2. Scan Devices for Malware

If your device clicked on a fake Steam link, it may have malicious programs like keyloggers or trojans. Download security software like Malwarebytes to scan all connected devices and remove any threats detected.

3. Contact Steam Support

Notify Steam Support about the compromise, providing relevant details about unauthorized access or purchases. Steam may rollback changes or issue refunds for fraudulent transactions in some cases. Provide any information requested to Steam during the investigation.

4. Monitor Financial Accounts

If your Steam account stored payment information, monitor linked financial accounts closely for signs of unauthorized charges. Notify your bank or card issuer immediately about potential compromise of card data.

5. File Police Reports if Needed

For severe account or financial impacts from fraud, file police reports about the scam with local law enforcement or through the FTC. These reports create an official record that may help support investigations or recovery efforts.

6. Increase Security Across Accounts

Take this opportunity to boost security across all your accounts. Update passwords, set up two-factor authentication, check privacy settings, and be more vigilant against potential phishing attempts going forward.

Staying alert and taking swift action offers the best chance to contain damages and recover from Steam gift card scam impacts. Don’t hesitate to seek help from Steam, financial providers, or authorities to stabilize accounts and finances.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the Steam Gift Card Scam

The Steam gift card scam is ensnaring more users across the platform. If you are unsure about a gift card offer you encountered or want to learn how to stay safe, this FAQ can help.

What Exactly is the Steam Gift Card Scam?

The Steam gift card scam involves recipients getting unsolicited messages offering free Steam wallet codes, typically $50. The links in these messages redirect to phishing sites designed to steal Steam account credentials and payment information or install malware on devices.

How Does the Scam Work?

Scammers send messages containing links to mimic Steam login portals or gift card claiming sites. Users get tricked into entering their Steam username and password on these fake sites, handing over their credentials to scammers. In other cases, clicking the link secretly downloads malware posing as a required Steam extension.

What Happens If I Fall Victim to This Scam?

If you input your Steam login details on a phishing site, scammers gain full access to your account. They can then steal any saved payment info, buy games fraudulently, sell your items on the Community Market, and spread the scam further. Downloaded malware may also steal data, take screenshots, and lockdown devices.

Who is Behind These Scam Attempts?

Individual hackers and organized cybercrime groups perpetrate these scams to make quick money through phishing, distributing malware, and reselling compromised Steam accounts and inventory items. Some scammers are also based overseas, making them harder to prosecute.

What Tactics Are Used to Trick Users?

  • Fake messages from hacked friend accounts on platforms like Discord
  • Phishing links mimicking legitimate Steam URLs
  • Fake Steam login portals replicas
  • Malware masquerading as vital Steam extensions
  • Promises of free gift cards worth $50 to $100

What Information Do Scammers Obtain?

By phishing Steam credentials, scammers can gain usernames, passwords, email addresses, birthdates, payment details, billing info, phone numbers, game licenses and more. Installed malware also extracts screenshots, keystrokes, network data, and other sensitive information.

Who is Most at Risk of This Scam?

Younger gamers, newer Steam users, active social media users, and deal/sale seekers are most likely to fall victim. But anyone eager for free Steam credit or games can be manipulated into clicking phishing links or providing account access.

How Can I Avoid Falling Victim to This Scam?

  • Never enter Steam login credentials on any site except steamcommunity.com and store.steampowered.com
  • Don’t trust unsolicited gift card offers, even from friends
  • Watch for typos or odd URLs in links promising free codes
  • Verify gift card sellers carefully before paying
  • Use strong unique passwords and enable two-factor authentication
  • Install and run updated antivirus software on all devices

What Should I Do if My Account is Compromised?

Immediately change your password from a clean device, contact Steam Support, monitor financial accounts for fraud, scan devices for malware, and consider filing a police report based on the extent of the breach.

How Can I Stay Updated on Current Steam Scams?

Check Steam discussions and forums regularly, follow gaming news sites, don’t ignore Steam security alerts, and report any scam attempts you encounter to raise awareness.

By staying vigilant and skeptical, you can avoid becoming another victim of the Steam gift card scam. Remember, if an offer seems too good to be true, it usually is.

The Bottom Line – Recognizing and Avoiding Steam Gift Card Scams

The Steam gift card scam exploits people’s enthusiasm for deals and virtual goods on the popular platform. By mimicking official communication channels and sites, scammers convince even seasoned users to click on their deceptive links.

The safest approach is to maintain vigilance about unsolicited offers, no matter how appealing. Any message offering Steam codes for free from unknown contacts should raise red flags. Resist clicking on links from such messages, even if the sender appears to be a friend.

On social media, thoroughly validate gift card sellers before transacting, especially involving alternative payment methods. Only buy directly from authorized Steam partners.

Fundamentally, remember that Steam gifts cards are never free. Avoid entering your Steam credentials anywhere except the official steamcommunity.com and store.steampowered.com sites.

Saving a few dollars is not worth having accounts drained or devices infected due to rushed decisions. Stay informed about the latest Steam scams making the rounds within the community. With greater awareness, gamers can collectively reduce the success of these frauds and keep accounts secure.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment