From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
Check Point Research uncovered a malware campaign exploiting expired Discord invite links to redirect users to malicious servers. The attackers use a combination of techniques including ClickFix phishing, multi-stage loaders, and time-based evasions to deliver AsyncRAT and a customized Skuld Stealer targeting crypto wallets. The campaign leverages trusted cloud services for payload delivery and data exfiltration to avoid detection. The operation continues to evolve, with threat actors now able to bypass Chrome's App Bound Encryption using adapted tools like ChromeKatz to steal cookies from new Chromium browser versions. The campaign highlights how subtle features in Discord's invite system can be exploited as attack vectors.
AI Analysis
Technical Summary
The threat campaign titled "From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery" involves a sophisticated multi-stage malware distribution operation exploiting expired Discord invite links. Attackers hijack these expired invites to redirect users to malicious servers, leveraging the inherent trust users place in Discord invite links. The campaign employs ClickFix phishing techniques to lure victims into interacting with malicious content. It uses multi-stage loaders and time-based evasion tactics to avoid detection by security solutions. The primary payloads delivered are AsyncRAT, a remote access trojan capable of extensive system control, and a customized variant of the Skuld Stealer malware specifically targeting cryptocurrency wallets, aiming to exfiltrate sensitive financial data. The attackers utilize trusted cloud services for both payload delivery and data exfiltration, which helps them blend their malicious traffic with legitimate network activity, further complicating detection efforts. Notably, the campaign has evolved to bypass Chrome's App Bound Encryption, a security feature designed to protect browser cookies, by using an adapted tool named ChromeKatz. This capability allows the threat actors to steal cookies from the latest Chromium-based browsers, potentially enabling session hijacking and unauthorized access to web accounts. The exploitation of subtle features in Discord's invite system as an attack vector highlights the innovative approach of the adversaries. Indicators of compromise include multiple malware hashes, IP addresses, and domains such as captchaguard.me and microads.top, which are involved in the campaign's infrastructure. The campaign is ongoing and continues to adapt, underscoring the persistent threat it poses to users relying on Discord and Chromium browsers.
Potential Impact
For European organizations, this campaign poses significant risks, particularly to entities with employees or users who actively use Discord and Chromium-based browsers. The targeted theft of cryptocurrency wallet data threatens financial assets, which is especially relevant for fintech companies, cryptocurrency exchanges, and individuals involved in digital asset management. The use of trusted cloud services for payload delivery and exfiltration complicates detection and response, increasing the likelihood of successful breaches. The ability to bypass Chrome's App Bound Encryption and steal browser cookies can lead to session hijacking, unauthorized access to corporate web applications, and potential lateral movement within networks. Phishing via hijacked Discord invites can also lead to initial compromise of endpoints, potentially resulting in data breaches, intellectual property theft, and disruption of business operations. The multi-stage and time-based evasion techniques mean that traditional signature-based defenses may be insufficient, increasing the risk of prolonged undetected presence within networks. Overall, the campaign can impact confidentiality, integrity, and availability of organizational data and systems, with potential financial and reputational damage.
Mitigation Recommendations
1. Implement advanced email and messaging security solutions that can detect and block phishing attempts, including those leveraging social platforms like Discord. 2. Educate employees and users about the risks of clicking on expired or suspicious Discord invite links and encourage verification of invite legitimacy before interaction. 3. Deploy endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and unusual process behaviors indicative of AsyncRAT or Skuld Stealer infections. 4. Monitor network traffic for connections to known malicious domains and IPs associated with this campaign (e.g., captchaguard.me, microads.top) and block them at the firewall or proxy level. 5. Enforce strict browser security policies, including disabling or restricting extensions and plugins that could be exploited, and regularly update Chromium-based browsers to the latest versions with security patches. 6. Utilize multi-factor authentication (MFA) for access to critical systems and web applications to mitigate risks from stolen cookies and session hijacking. 7. Conduct regular threat hunting exercises focusing on indicators of compromise related to AsyncRAT, Skuld Stealer, and ChromeKatz activity. 8. Limit the use of cloud services for sensitive data transfer unless encrypted and monitored, and apply strict access controls. 9. Implement network segmentation to contain potential infections and reduce lateral movement opportunities. 10. Collaborate with Discord and cloud service providers to report and remediate hijacked invite links and malicious infrastructure promptly.
Affected Countries
Austria, France, Germany, Netherlands, Slovakia
Indicators of Compromise
- hash: 7834b9b4574b68ba85eabd79b9770b08
- hash: fc13b02d22f6fe582e2948259660e3d5
- hash: 4501e8029fedadab2cbaa9e504301200c4cd2bfe
- hash: d383b44cb3c7e5a2e460300182d89932869a7281
- hash: 160eda7ad14610d93f28b7dee20501028c1a9d4f5dc0437794ccfc2604807693
- hash: 375fa2e3e936d05131ee71c5a72d1b703e58ec00ae103bbea552c031d3bfbdbe
- hash: 53b65b7c38e3d3fca465c547a8c1acc53c8723877c6884f8c3495ff8ccc94fbe
- hash: 5d0509f68a9b7c415a726be75a078180e3f02e59866f193b0a99eee8e39c874f
- hash: 670be5b8c7fcd6e2920a4929fcaa380b1b0750bfa27336991a483c0c0221236a
- hash: 673090abada8ca47419a5dbc37c5443fe990973613981ce622f30e83683dc932
- hash: 8135f126764592be3df17200f49140bfb546ec1b2c34a153aa509465406cb46c
- hash: d54fa589708546eca500fbeea44363443b86f2617c15c8f7603ff4fb05d494c1
- hash: db1aa52842247fc3e726b339f7f4911491836b0931c322d1d2ab218ac5a4fb08
- hash: ef8c2f3c36fff5fccad806af47ded1fd53ad3e7ae22673e28e541460ff0db49c
- hash: f08676eeb489087bc0e47bd08a3f7c4b57ef5941698bc09d30857c650763859c
- ip: 101.99.76.120
- ip: 87.120.127.37
- url: https://captchaguard.me/?key=
- domain: captchaguard.me
- domain: microads.top
- domain: request.open
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
Description
Check Point Research uncovered a malware campaign exploiting expired Discord invite links to redirect users to malicious servers. The attackers use a combination of techniques including ClickFix phishing, multi-stage loaders, and time-based evasions to deliver AsyncRAT and a customized Skuld Stealer targeting crypto wallets. The campaign leverages trusted cloud services for payload delivery and data exfiltration to avoid detection. The operation continues to evolve, with threat actors now able to bypass Chrome's App Bound Encryption using adapted tools like ChromeKatz to steal cookies from new Chromium browser versions. The campaign highlights how subtle features in Discord's invite system can be exploited as attack vectors.
AI-Powered Analysis
Technical Analysis
The threat campaign titled "From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery" involves a sophisticated multi-stage malware distribution operation exploiting expired Discord invite links. Attackers hijack these expired invites to redirect users to malicious servers, leveraging the inherent trust users place in Discord invite links. The campaign employs ClickFix phishing techniques to lure victims into interacting with malicious content. It uses multi-stage loaders and time-based evasion tactics to avoid detection by security solutions. The primary payloads delivered are AsyncRAT, a remote access trojan capable of extensive system control, and a customized variant of the Skuld Stealer malware specifically targeting cryptocurrency wallets, aiming to exfiltrate sensitive financial data. The attackers utilize trusted cloud services for both payload delivery and data exfiltration, which helps them blend their malicious traffic with legitimate network activity, further complicating detection efforts. Notably, the campaign has evolved to bypass Chrome's App Bound Encryption, a security feature designed to protect browser cookies, by using an adapted tool named ChromeKatz. This capability allows the threat actors to steal cookies from the latest Chromium-based browsers, potentially enabling session hijacking and unauthorized access to web accounts. The exploitation of subtle features in Discord's invite system as an attack vector highlights the innovative approach of the adversaries. Indicators of compromise include multiple malware hashes, IP addresses, and domains such as captchaguard.me and microads.top, which are involved in the campaign's infrastructure. The campaign is ongoing and continues to adapt, underscoring the persistent threat it poses to users relying on Discord and Chromium browsers.
Potential Impact
For European organizations, this campaign poses significant risks, particularly to entities with employees or users who actively use Discord and Chromium-based browsers. The targeted theft of cryptocurrency wallet data threatens financial assets, which is especially relevant for fintech companies, cryptocurrency exchanges, and individuals involved in digital asset management. The use of trusted cloud services for payload delivery and exfiltration complicates detection and response, increasing the likelihood of successful breaches. The ability to bypass Chrome's App Bound Encryption and steal browser cookies can lead to session hijacking, unauthorized access to corporate web applications, and potential lateral movement within networks. Phishing via hijacked Discord invites can also lead to initial compromise of endpoints, potentially resulting in data breaches, intellectual property theft, and disruption of business operations. The multi-stage and time-based evasion techniques mean that traditional signature-based defenses may be insufficient, increasing the risk of prolonged undetected presence within networks. Overall, the campaign can impact confidentiality, integrity, and availability of organizational data and systems, with potential financial and reputational damage.
Mitigation Recommendations
1. Implement advanced email and messaging security solutions that can detect and block phishing attempts, including those leveraging social platforms like Discord. 2. Educate employees and users about the risks of clicking on expired or suspicious Discord invite links and encourage verification of invite legitimacy before interaction. 3. Deploy endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and unusual process behaviors indicative of AsyncRAT or Skuld Stealer infections. 4. Monitor network traffic for connections to known malicious domains and IPs associated with this campaign (e.g., captchaguard.me, microads.top) and block them at the firewall or proxy level. 5. Enforce strict browser security policies, including disabling or restricting extensions and plugins that could be exploited, and regularly update Chromium-based browsers to the latest versions with security patches. 6. Utilize multi-factor authentication (MFA) for access to critical systems and web applications to mitigate risks from stolen cookies and session hijacking. 7. Conduct regular threat hunting exercises focusing on indicators of compromise related to AsyncRAT, Skuld Stealer, and ChromeKatz activity. 8. Limit the use of cloud services for sensitive data transfer unless encrypted and monitored, and apply strict access controls. 9. Implement network segmentation to contain potential infections and reduce lateral movement opportunities. 10. Collaborate with Discord and cloud service providers to report and remediate hijacked invite links and malicious infrastructure promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery"]
- Adversary
- null
- Pulse Id
- 684c39e8dd56f16d5a6349bc
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash7834b9b4574b68ba85eabd79b9770b08 | — | |
hashfc13b02d22f6fe582e2948259660e3d5 | — | |
hash4501e8029fedadab2cbaa9e504301200c4cd2bfe | — | |
hashd383b44cb3c7e5a2e460300182d89932869a7281 | — | |
hash160eda7ad14610d93f28b7dee20501028c1a9d4f5dc0437794ccfc2604807693 | — | |
hash375fa2e3e936d05131ee71c5a72d1b703e58ec00ae103bbea552c031d3bfbdbe | — | |
hash53b65b7c38e3d3fca465c547a8c1acc53c8723877c6884f8c3495ff8ccc94fbe | — | |
hash5d0509f68a9b7c415a726be75a078180e3f02e59866f193b0a99eee8e39c874f | — | |
hash670be5b8c7fcd6e2920a4929fcaa380b1b0750bfa27336991a483c0c0221236a | — | |
hash673090abada8ca47419a5dbc37c5443fe990973613981ce622f30e83683dc932 | — | |
hash8135f126764592be3df17200f49140bfb546ec1b2c34a153aa509465406cb46c | — | |
hashd54fa589708546eca500fbeea44363443b86f2617c15c8f7603ff4fb05d494c1 | — | |
hashdb1aa52842247fc3e726b339f7f4911491836b0931c322d1d2ab218ac5a4fb08 | — | |
hashef8c2f3c36fff5fccad806af47ded1fd53ad3e7ae22673e28e541460ff0db49c | — | |
hashf08676eeb489087bc0e47bd08a3f7c4b57ef5941698bc09d30857c650763859c | — |
Ip
Value | Description | Copy |
---|---|---|
ip101.99.76.120 | — | |
ip87.120.127.37 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttps://captchaguard.me/?key= | — |
Domain
Value | Description | Copy |
---|---|---|
domaincaptchaguard.me | — | |
domainmicroads.top | — | |
domainrequest.open | — |
Threat ID: 684c8b50a8c921274380ebb9
Added to database: 6/13/2025, 8:34:24 PM
Last enriched: 6/13/2025, 8:49:45 PM
Last updated: 6/15/2025, 1:56:27 PM
Views: 2
Related Threats
May 2025 Security Issues in Korean & Global Financial Sector
MediumPrivate Contractor Linked to Multiple Chinese State-Sponsored Groups
MediumAnubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
MediumServerless Tokens in the Cloud: Exploitation and Detections
MediumWhat is the Real Relationship between WordPress Hackers and Malicious Adtech?
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.