Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
a) Either by logging into a site that faked a Steam login and made a bot log into your account using the save password as well as the trust device feature while injecting a Steam API access into it.
b) Or by installing malware that stole your session data or injected a keylogger.
For that reason, trading using third party sites is considered a huge security risk.
1. Scan for malware https://www.malwarebytes.com/
2. Check that the email and phone number on the Steam account are still yours.
3. Deauthorize all other devices https://store.steampowered.com/twofactor/manage
4. Change passwords from a clean computer
5. Generate new backup codes for your Mobile App https://store.steampowered.com/twofactor/manage
6. Revoke the API key https://steamcommunity.com/dev/apikey (there should be nothing in the APIKEY)
7. Change your trade link: Profile > your inventory > trade offer > Who can send me trade offer > scroll down and make a new trade link.
Spent Steam Points are non-refundable.
You can try to reset (not just change) your password. Resetting your password will cancel all given awards and return your points.
You should still secure your account first (see post #1).
You have to reset your password. Changing it doesn't cancel your awards.
Your account is still compromised! Secure your account!
You're assuming when the attacker robbed your account was the same moment when they got the credentials. What evidence do you have for that assumption? The reality is users give away their credentials and it could be days, weeks, even months before an attacker exploits them.
In short you're making the most convenient self-serving arguments to protect your ego. But it doesn't change reality. You're not alone, human beings are just perpetually bad at account management and account security. The user is the weakest part of the security model, it's why so many techniques involve exploiting user weakness as opposed to l33t h4x0ring the platform. The first is almost trivial, and the other is hard, time consuming, labor intensive and can be fixed quickly. But human beings, they're never going to change, so they're a much more attractive target.
It is possible to secure your account and keep it secure. But it requires you to take this close call and learn what matters and why to avoid future mistakes.