From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery

Medium
Published: Fri Jun 13 2025 (06/13/2025, 14:47:04 UTC)
Source: AlienVault OTX General

Description

Check Point Research uncovered a malware campaign exploiting expired Discord invite links to redirect users to malicious servers. The attackers use a combination of techniques including ClickFix phishing, multi-stage loaders, and time-based evasions to deliver AsyncRAT and a customized Skuld Stealer targeting crypto wallets. The campaign leverages trusted cloud services for payload delivery and data exfiltration to avoid detection. The operation continues to evolve, with threat actors now able to bypass Chrome's App Bound Encryption using adapted tools like ChromeKatz to steal cookies from new Chromium browser versions. The campaign highlights how subtle features in Discord's invite system can be exploited as attack vectors.

AI-Powered Analysis

AILast updated: 06/13/2025, 20:49:45 UTC

Technical Analysis

The threat campaign titled "From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery" involves a sophisticated multi-stage malware distribution operation exploiting expired Discord invite links. Attackers hijack these expired invites to redirect users to malicious servers, leveraging the inherent trust users place in Discord invite links. The campaign employs ClickFix phishing techniques to lure victims into interacting with malicious content. It uses multi-stage loaders and time-based evasion tactics to avoid detection by security solutions. The primary payloads delivered are AsyncRAT, a remote access trojan capable of extensive system control, and a customized variant of the Skuld Stealer malware specifically targeting cryptocurrency wallets, aiming to exfiltrate sensitive financial data. The attackers utilize trusted cloud services for both payload delivery and data exfiltration, which helps them blend their malicious traffic with legitimate network activity, further complicating detection efforts. Notably, the campaign has evolved to bypass Chrome's App Bound Encryption, a security feature designed to protect browser cookies, by using an adapted tool named ChromeKatz. This capability allows the threat actors to steal cookies from the latest Chromium-based browsers, potentially enabling session hijacking and unauthorized access to web accounts. The exploitation of subtle features in Discord's invite system as an attack vector highlights the innovative approach of the adversaries. Indicators of compromise include multiple malware hashes, IP addresses, and domains such as captchaguard.me and microads.top, which are involved in the campaign's infrastructure. The campaign is ongoing and continues to adapt, underscoring the persistent threat it poses to users relying on Discord and Chromium browsers.

Potential Impact

For European organizations, this campaign poses significant risks, particularly to entities with employees or users who actively use Discord and Chromium-based browsers. The targeted theft of cryptocurrency wallet data threatens financial assets, which is especially relevant for fintech companies, cryptocurrency exchanges, and individuals involved in digital asset management. The use of trusted cloud services for payload delivery and exfiltration complicates detection and response, increasing the likelihood of successful breaches. The ability to bypass Chrome's App Bound Encryption and steal browser cookies can lead to session hijacking, unauthorized access to corporate web applications, and potential lateral movement within networks. Phishing via hijacked Discord invites can also lead to initial compromise of endpoints, potentially resulting in data breaches, intellectual property theft, and disruption of business operations. The multi-stage and time-based evasion techniques mean that traditional signature-based defenses may be insufficient, increasing the risk of prolonged undetected presence within networks. Overall, the campaign can impact confidentiality, integrity, and availability of organizational data and systems, with potential financial and reputational damage.

Mitigation Recommendations

1. Implement advanced email and messaging security solutions that can detect and block phishing attempts, including those leveraging social platforms like Discord. 2. Educate employees and users about the risks of clicking on expired or suspicious Discord invite links and encourage verification of invite legitimacy before interaction. 3. Deploy endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and unusual process behaviors indicative of AsyncRAT or Skuld Stealer infections. 4. Monitor network traffic for connections to known malicious domains and IPs associated with this campaign (e.g., captchaguard.me, microads.top) and block them at the firewall or proxy level. 5. Enforce strict browser security policies, including disabling or restricting extensions and plugins that could be exploited, and regularly update Chromium-based browsers to the latest versions with security patches. 6. Utilize multi-factor authentication (MFA) for access to critical systems and web applications to mitigate risks from stolen cookies and session hijacking. 7. Conduct regular threat hunting exercises focusing on indicators of compromise related to AsyncRAT, Skuld Stealer, and ChromeKatz activity. 8. Limit the use of cloud services for sensitive data transfer unless encrypted and monitored, and apply strict access controls. 9. Implement network segmentation to contain potential infections and reduce lateral movement opportunities. 10. Collaborate with Discord and cloud service providers to report and remediate hijacked invite links and malicious infrastructure promptly.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery"]
Adversary
null
Pulse Id
684c39e8dd56f16d5a6349bc
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash7834b9b4574b68ba85eabd79b9770b08
hashfc13b02d22f6fe582e2948259660e3d5
hash4501e8029fedadab2cbaa9e504301200c4cd2bfe
hashd383b44cb3c7e5a2e460300182d89932869a7281
hash160eda7ad14610d93f28b7dee20501028c1a9d4f5dc0437794ccfc2604807693
hash375fa2e3e936d05131ee71c5a72d1b703e58ec00ae103bbea552c031d3bfbdbe
hash53b65b7c38e3d3fca465c547a8c1acc53c8723877c6884f8c3495ff8ccc94fbe
hash5d0509f68a9b7c415a726be75a078180e3f02e59866f193b0a99eee8e39c874f
hash670be5b8c7fcd6e2920a4929fcaa380b1b0750bfa27336991a483c0c0221236a
hash673090abada8ca47419a5dbc37c5443fe990973613981ce622f30e83683dc932
hash8135f126764592be3df17200f49140bfb546ec1b2c34a153aa509465406cb46c
hashd54fa589708546eca500fbeea44363443b86f2617c15c8f7603ff4fb05d494c1
hashdb1aa52842247fc3e726b339f7f4911491836b0931c322d1d2ab218ac5a4fb08
hashef8c2f3c36fff5fccad806af47ded1fd53ad3e7ae22673e28e541460ff0db49c
hashf08676eeb489087bc0e47bd08a3f7c4b57ef5941698bc09d30857c650763859c

Ip

ValueDescriptionCopy
ip101.99.76.120
ip87.120.127.37

Url

ValueDescriptionCopy
urlhttps://captchaguard.me/?key=

Domain

ValueDescriptionCopy
domaincaptchaguard.me
domainmicroads.top
domainrequest.open

Threat ID: 684c8b50a8c921274380ebb9

Added to database: 6/13/2025, 8:34:24 PM

Last enriched: 6/13/2025, 8:49:45 PM

Last updated: 6/15/2025, 1:56:27 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats