Duet Night Abyss cover art

Gacha Game Sent Players Malware in Loot Boxes

Last Updated
April 9, 2026

Table of Contents

Duet Night Abyss, a free-to-play gacha RPG developed by Pan Studio and published by Hero Games, distributed malware to PC players through an update to its Steam launcher on 18 March 2026. The malware — Trojan:MSIL/UmbralStealer.DG!MTB, an infostealer — was delivered via a routine launcher patch, not a third-party fake download. Pan Studio apologised publicly and issued 10 free gacha pulls as compensation.

Incident detail Information
Game Duet Night Abyss (PC, free-to-play)
Developer Pan Studio
Platform Steam (PC)
Incident date 18 March 2026
Malware Trojan:MSIL/UmbralStealer.DG!MTB (Umbral Stealer)
Malware type Infostealer
Vector Launcher update patch via Steam
Awareness after patch 24 minutes
Emergency fix deployed Approximately 2.5 hours after awareness
Compensation 10 Prismatic Hourglasses (10 pulls) + 5 Commission Manual: Volume III
Claim deadline 26 March 2026, 8:59 AM PT

The story, first reported by Kotaku, is a striking inversion of the usual mobile game security threat model. This was not a fake APK on a third-party site. The malware arrived through the developer’s own Steam distribution pipeline, inside a patch players were prompted to install.

What Umbral Stealer Does

Umbral Stealer (Trojan:MSIL/UmbralStealer.DG!MTB) is an infostealer first identified in 2023. Because it is not new, most modern antivirus software successfully quarantined it on detection. However, players whose antivirus did not catch it were exposed to a malware capable of:

  • Recording keystrokes — capturing everything typed on the affected machine
  • Webcam recording — capturing video via the device camera without user notification
  • Screenshot capture — taking screenshots of active windows
  • Credential theft — stealing passwords stored in browsers
  • Cryptocurrency wallet theft — extracting cryptocurrency wallet files and seed phrases
  • Session token harvesting — stealing active session tokens from Discord, Telegram, Minecraft, and Roblox

Pan Studio’s timeline shows the compromised launcher patch went live on Steam at 7:39 AM UTC on 18 March. The team identified the issue 24 minutes later and deployed an emergency fix roughly 2.5 hours after detection.

How Malware Got Into the Official Launcher Update

Loot box rewards in gacha titles arrive through the game client — players tap a button, the client processes the reward, items land in the account. In Duet Night Abyss’s case, the malicious payload was embedded in a launcher update patch distributed through Steam, not a reward claim itself. But the delivery mechanism relied on the same conditioned trust: players saw a standard game update prompt, clicked install, and the patch ran with whatever system permissions the launcher holds.

Pan Studio attributed the incident to “a malicious attack originating from a specific region, targeting our internal office systems and live servers.” The studio characterised it as an external attack on their infrastructure, not an insider action.

“This incident has served as a serious wake-up call for our team,” Pan Studio said in its official statement.

This Is Not the First Time

Kotaku reports this is the second time Duet Night Abyss has been compromised through its launcher in a single month. A previous incident in late February 2026 distributed a far less harmful payload — one that simply instructed players to play Genshin Impact. That incident appeared designed as a warning to Pan Studio rather than a genuine attack on players.

The repeat compromise raises questions about whether the “security enhancements” announced after the February incident were adequate.

The Apology and What It Actually Means

Pan Studio’s compensation package gives all players:

  • 10 Prismatic Hourglasses — equivalent to 10 free gacha pulls
  • 5 Commission Manual: Volume III — items that boost rewards from Covert Commissions quests

Items are available via the in-game Mail function and must be claimed by 26 March 2026 at 8:59 AM PT.

The apology pack is the gacha industry’s standard response to any disruption — server outages, botched updates, content delays. It functions well when the problem is a technical inconvenience. It functions poorly when players were exposed to an infostealer that may have harvested their credentials.

“We understand that apologies and compensation cannot immediately bridge the gap in trust,” Pan Studio acknowledged in its statement.

Compensation currency does not answer the question players are sitting with: is my machine clean, and was my data taken? Those are not questions 10 gacha pulls resolve.

What Affected PC Players Should Do Right Now

If you installed the Duet Night Abyss launcher update on 18 March 2026, take these steps regardless of how Pan Studio frames the risk level.

  • Run a full PC scan with a reputable security tool — Malwarebytes and Bitdefender are both effective against Umbral Stealer
  • Change passwords for all accounts accessed on the affected machine — prioritise email, banking, and any account linked to the game itself
  • Revoke and regenerate Discord and Telegram session tokens — Umbral Stealer specifically targets these
  • Check cryptocurrency wallets for unauthorised transactions; move funds to a fresh wallet if you had wallets active on the affected machine
  • Audit active sessions on all services tied to the device and terminate any you did not initiate
  • Check for unfamiliar charges on linked payment methods or linked mobile billing

Pan Studio’s public apology and timeline confirm the incident window: 7:39 AM UTC to approximately 10:09 AM UTC on 18 March 2026. Use that window to scope when to look for anomalies in account activity.

Why This Story Matters Beyond One Game

Gacha games operate on a psychological contract. Players accept the monetisation model — banner cycles, stamina timers, premium currency — because the pull loop itself feels safe and fair. You tap a reward notification, you receive a reward. The loop is routine.

Shipping an infostealer through that loop, even accidentally, breaks something in-game currency cannot replace. The SEA mobile gaming market has some of the highest gacha engagement rates globally, and SEA players — many of whom play multiple gacha titles simultaneously — link real payment methods and personal accounts to these games.

The deeper structural issue, as analysts noted in the wake of this incident, is launcher-level system access. Modern game launchers increasingly require deep system permissions to support anti-cheat software. When a launcher update carries an infostealer, it arrives with the access the player already granted. Pan Studio’s response sets a precedent: is the answer better internal security, third-party code audits, or something more fundamental about how launcher permissions are scoped?

Watch the developer’s next communication carefully. The pattern of issuing in-game rewards as damage control is a standard playbook. What Pan Studio says about affected devices, data handling, and security audit results in the coming days is the communication that actually matters.

Source: Kotaku — “Gacha Game Distributes Malware, Apologizes With 10 Free Pulls”, Lewis Parker, 19 March 2026. GameSpot — “After Infecting PCs With Malware, Gacha Game Gives Out Free Loot Boxes To Apologize”, Claire Lewis, 19 March 2026.

Share This Article
Facebook
X
WhatsApp
Telegram
Threads
Latest Article
Related Article
Gears Tower Defense app icon
Gears Tower Defense: Merge TD launched globally on iOS and
Metro 2039 cover art — PC, PlayStation 5, Xbox Series X
Metro 2039 is officially confirmed by 4A Games and Deep
007: First Light gameplay screenshot
Story spoilers for 007: First Light surfaced from an Indonesian
Call of Duty: Modern Warfare 4 news
Leaker TheGhostOfHope claims Call of Duty 2026 is Modern Warfare