It's a trap! Malware disguises itself as Grand Theft Auto 5 for PC gamers

After hitting more than $1 billion in sales in a scant seven days, Grand Theft Auto 5 is officially a cultural phenomenon--at least if you're a console gamer.

While PlayStation and Xbox buffs have been busy wreaking havoc as Trevor, Michael, and Franklin, snubbed PC gamers have been left filing out signature-packed petitions in an attempt to convince Rockstar Games to bring its blockbuster to the PC.

Enter the scammers. How can they resist, with that much pent-up demand?

While Rockstar has yet to announce any formal PC plans, a torrent dubbed "GTA V Full PC Game + Crack" has popped up on illegal download sites, sporting a hefty 18GB file size. Could this be it?


WCCFTech, the first site to report on the torrent, reports that attempting to install the "game" takes you to a phishing site that attempts to coax you into handing over your personal information to "register" the title. And what about the 18GB worth of files itself? That's less clear. In a best-case scenario, it's just junk data that clogged your pipes and chewed up your bandwidth cap. In a worst-case scenario--and a more likely one--it's probably infested with malware and other nasty stuff.

Several less-than-scrupulous PC gamers appear to have taken in by the scam. WCCFTech claims the torrent has been downloaded "thousands" of times; while I'm not able to verify that, a quick check at torrent sites shows that "GTA V Full PC Game + Crack" still has several hundred seeders and leechers.

Be patient, fellow PC gamers. GTA IV landed on PCs a few months after appearing on consoles, as have most of Rockstar's other games. (Quiet, you disappointed Red Dead Redemption fans.)

Join the CSO newsletter!

Error: Please check your email address.

Tags securitygames

More about RockstarRockstar GamesXbox

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Brad Chacos

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place