This documentation is not meant to be used as a guide. Specific code for things mentioned herein is not, and will not be provided. Some portions of this documentation may include slight speculation based on facts and evidence as I understand them. I will try to include as much information as possible, as information deserves to be free and publicized.
Permission is hereby granted, free of charge, to any person obtaining a copy of the information contained in this document (the "Information"), to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Information, subject to the following conditions:
By using the Information, you acknowledge that:
Theres a large misconception on how current Steam API scams work. I believe this misinformation to be spread via content creators misconceptions and dated views on how these scams work. Within this documentation, I hope to provide the information I’ve gathered in a means that is descriptive and understandable for all audiences, developers or not. I also hope to break the misinformed bonds that seemingly hold this scam together. I’d like to state that the advice given by creators such as Anomoly and Hey Zeus to prevent and handle these scams is appropriate and can be helpful, however It’s clear to me that they (and mostly everyone) has a severe misunderstanding on how API Scams work, along with Steams OpenID login process and how Steam sessions works. This will all be uncovered in the following documentation. I highly encourage readers to look more in depth at the linked resources within the document in order to gain a deeper and more nuanced understanding.
First, lets gain an deeper understanding on how these scams actually work, then we can delve into the misconceptions that surround this scam, which seemingly are portrayed and extended through minsinformation and dated information. Here are the steps in which a large majority of API scammers follow to initate an API scam:
When inputting purposefully bogus (non accurate/correct) data into the username and password fields, it’ll actually display that the information isnt correct, similarly to a legit login attempt. This is VERY interesting as if it were truly a fake implemention of steams login, it wouldnt be able to confirm whether the entered data is accurate or not. I ran this finding over with a user named mixa. He had the idea that the credentials inputted on the site are parsed through a legit Steam OpenID login† on the sites backend servers. This makes complete sense and actually corroborates with [reconnaissance](https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_reconnaissance.htm#:~:text=Information Gathering and getting to,information about a target system.) I had done on the site using Charles Proxy, a HTTP proxy that allows one to see all web (HTTP-based) requests from a website or program running on your computer
† Steam uses OpenID to login users to third party sites, this OpenID login library is managed by and through steam. The third party site utilizes Steams OpenID by sending the correct requests to the correct endpoint URL “https://steamcommunity.com/openid/”; the OpenID login isnt managed by the site. Only a legit Steam OpenID implementation can differ/determine whether a login attempt is, or isnt, valid. Session cookies are sent to a site whenever a login attempt is initiated. A valid login attempt will typically send a unique identifier for the user to claim (not an API key) this identifier contains the users Steam UserID (”SteamID”); typically formatted as follows: “http://steamcommunity.com/openid/id/<steamid>”. This SteamID then can be used to get profile and persona information (such as profile picture, and public account details like profile name, location, real name, etc) through legit requests to steams API endpoint (this is commonly done for basically every legit site which uses Steam login). While a non valid login attempt will send back a error in authentication, this error may differ regarding the exact implementation of the OpenID login. More information regarding Steam OpenID library and login/auth process can be found here.
The sends the credentials from the login site to their backend; this information is either read as valid, or non valid via the legit OpenID implementation. Using Charles Proxy, aforementioned, we are able to see a POST request from the website, likely to the sites database in which login credentials can be stored and parsed through the OpenID validator through the sites backend server code.
The sites legit OpenID validator setup on the the sites backend will confirm whether the credentials are valid, or non valid. This is then sent to the real-looking login page, making it seem as if the login page is legit by updating the HTML code of the site (likely using DOM manipulation to create dynamic and updatable contents to the page) to either dynamically display the next step (entering in 2fa code), or stating that the login credentials are incorrect, portraying that of which a real login page would do.
From here, the scam can take another branch in ways of accessing your account, to better understand this, please read section 1.5(a-b) in completion.
Without the Steam Mobile Guard active (using email for the 2fa):
First, the bot will login with the credentials you provide them through the fake login, the bot loging in will initiate steam to send a confirmation that its truly you logging in. The fake login will tell you to check your email and provide them with the 2fa email code. The email will look something like this- note the Russian IP.
The IP is most likely from a proxy service and doesnt mean anything.
Basically, the scammers hope to trick you into thinking that you are truly logging into steam on the site, while the login on the scam website is fake and they are actually just using the credentials you give them to gain access into your account.
With the Steam Mobile Guard active (using the mobile guard authy as 2fa):
Note: This “bot” isnt really a bot account, but moreso a script that leverages the use of your credentials and session login cookies, sent through the login process. This session is then used by the scammer to maintain a login on your account which allows them to control your trades (the scammers script creates a maintained login session to your account). This session created by the scammer can be terminated through deauth of devices, changing password, and another deauth of devices.
The only thing that can remove the bot’s access to your account is changing the password to your Steam account and deauthorizing all devices. To be safer, I would highly reccomend first deauthorizing all devices, then changing your password, then deauthorizing all devices again. it is not a good idea to immediately change your API Key in this scenario, since legit services rely on this API Key to correctly function, and the API key is not a vulnerability for this scam to work. As will be mentioned, you cannot be scammed through it.
With the scammers bot now having access into your account, it not only can decline trades automatically, but it now also has access to every aspect of your account that doesnt require additional 2fa authentication- eg: changing password, removing steam guard, etc,.
This section was written after finishing the document, this may contain more in-depth information than some of what I mention in other sections, as I now have a even deeper understanding on how this works.