Steam'i Yükleyin
giriş
|
dil
简体中文 (Basitleştirilmiş Çince)
繁體中文 (Geleneksel Çince)
日本語 (Japonca)
한국어 (Korece)
ไทย (Tayca)
Български (Bulgarca)
Čeština (Çekçe)
Dansk (Danca)
Deutsch (Almanca)
English (İngilizce)
Español - España (İspanyolca - İspanya)
Español - Latinoamérica (İspanyolca - Latin Amerika)
Ελληνικά (Yunanca)
Français (Fransızca)
Italiano (İtalyanca)
Bahasa Indonesia (Endonezce)
Magyar (Macarca)
Nederlands (Hollandaca)
Norsk (Norveççe)
Polski (Lehçe)
Português (Portekizce - Portekiz)
Português - Brasil (Portekizce - Brezilya)
Română (Rumence)
Русский (Rusça)
Suomi (Fince)
Svenska (İsveççe)
Tiếng Việt (Vietnamca)
Українська (Ukraynaca)
Bir çeviri sorunu bildirin
Follow steps 1-6 to secure your account:
1. Scan for malware https://www.malwarebytes.com/
2. Check that the email and phone number on the Steam account are still yours.
3. Deauthorize all other devices https://store.steampowered.com/twofactor/manage
4. Change passwords from a trusted/clean device.
5. Generate new backup codes for your Mobile App https://store.steampowered.com/twofactor/manage
6. Revoke the API key https://steamcommunity.com/dev/apikey (there should be nothing in the APIKEY)
Regarding items:
https://help.steampowered.com/faqs/view/3B6E-B322-2400-8D24
all the emails and the like were still mine though they had changed all my privacy settings.
what do you mean by third party sites? and how does that bypass 2factor?
Ok thank you. I think the only place I have connected steam to are paradoxes site, gog and creative Assemblies new forums are you suggesting I shouldn't even connect in semi official places like this?
To be on the safer side I wouldn't, although usually the culprits are the various third party trading/gambling sites that Valve doesn't condone yet technically sort of allows to exist.
As that session token is essentially permanent, the hijacking can happen anytime until the wary user deauthorizes all devices.
Conversely, malware can steal such a session token from your computer as well. The tokens are not HWID bound and therefore reusable.
The only way to prevent this attack, from Valve's side, is to never allow "save password" and "trust device", but then offline mode would have to be removed (the DRM uses this session token for offline authentication as well).
Square Enix for example requires the second factor at all times in FF14 and is therefore immune to a session token attack.
The thing to remember is that such attacks are innocuous. They LOVE to get you to do something by looking nothing much or to catch you off guard.
So it can be links in game chat from a friend (that's not actually your friend), or a site that you ended up wandering to where you may have logged into Steam to look at something (but you didn't actually log in, you gave them your info).
This is how they usually work because you will swear blind you never visted them but you simply forgot or maybe weren't aware even.
The thing to remember is this - NEVER click on any links even from friends and never ever log into Steam except through Steam itself.
Never visit sites that deal with steam inventories, gambling, or dodgy game keys.