Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    The AI Hype Index: AI-powered toys are coming

    June 27, 2025

    How to Schedule Incremental Backups Using rsync and cron

    June 27, 2025

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Cyber Security

    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

    MichaBy MichaJune 25, 2025No Comments4 Mins Read
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets


    New Cyber Threat: Discord Invite Link Exploitation

    In a groundbreaking revelation, cybersecurity experts have uncovered a sophisticated malware campaign targeting Discord, using its invitation system to deploy information stealers like Skuld and remote access trojans such as AsyncRAT. This article delves into the mechanics of this attack, the vulnerabilities of Discord’s invite system, and what users can do to protect themselves.

    Understanding the Cyber Attack on Discord

    Cybercriminals are exploiting a critical weakness in Discord’s invitation mechanism, enabling them to hijack expired or deleted invite links. According to a report from Check Point, attackers leverage vanity link registrations, allowing them to redirect users from trusted sources to harmful servers.

    The Role of ClickFix Phishing Techniques

    The attackers utilize a combination of advanced techniques including ClickFix phishing, multi-stage loaders, and time-based evasions. This stealthy delivery method ensures that users are unaware of the malware being introduced into their systems. Specifically, criminals are targeting cryptocurrency wallets through the customized Skuld Stealer, facilitating the extraction of sensitive user information.

    Discord’s Invitation System: A Double-Edged Sword

    The flaw lies in the ability to reuse expired or deleted codes in custom vanity invite links. This vulnerability poses a significant risk as trusted invite links, previously shared within communities, can lead to illegitimate Discord servers controlled by cybercriminals.

    Consequences of Invite Link Hijacking

    When users interact with these compromised links, they are often prompted to complete a verification process. This often includes authorizing a bot, leading them to a fake website containing a malicious “Verify” button.

    How the Malicious Process Works

    This verification process employs social engineering tactics to trick users into executing harmful commands. By clicking “Verify,” a JavaScript command is executed, copying a PowerShell command to the clipboard. Users are then instructed to run a PowerShell command that ultimately downloads the AsyncRAT trojan and Skuld Stealer from a remote server.

    The Attack’s Multi-Stage Nature

    At its core, the attack is a meticulously planned, multi-stage process designed not only for precision but also to evade security checks. The AsyncRAT malware provides comprehensive remote access capabilities, while the Skuld Stealer focuses on collecting sensitive information from various platforms, including crypto wallets and gaming platforms.

    Technical Features of the Malware

    One of the notable features of the Skuld Stealer is its ability to harvest crypto wallet seed phrases and passwords from applications like Exodus and Atomic. Utilizing wallet injection techniques, the malware replaces legitimate application files with trojanized versions obtained from repositories like GitHub.

    Exfiltration via Trusted Platforms

    The information gathered by these malicious programs is exfiltrated using trusted cloud services such as GitHub, Bitbucket, and Discord webhook, allowing attackers to blend in with normal internet traffic and avoid detection.

    Recent Developments and Mitigation Strategies

    Check Point has identified similar campaigns, including the distribution of malware disguised as a hack tool for unlocking pirated games, already downloaded hundreds of times. Users are advised to remain vigilant and follow best practices in cybersecurity to protect their assets.

    Practical Tips for Users

    • Be Skeptical of Invite Links: Always verify the authenticity of Discord invite links before clicking.
    • Use Security Tools: Implement antivirus programs and firewalls to monitor network activity and block suspicious commands.
    • Enable Two-Factor Authentication: This adds an extra layer of protection, making unauthorized access considerably more challenging.

    Conclusion: Staying Ahead of Cyber Threats

    This latest campaign highlights the need for increased vigilance on platforms like Discord. With cybercriminals continuously developing new tactics to exploit even subtle features of platforms, users must remain informed and proactive in safeguarding their digital assets.

    FAQ

    Question 1: What kind of malware is being spread through Discord?

    Attackers are primarily using AsyncRAT remote access trojans and Skuld information stealers targeting cryptocurrency wallets.

    Question 2: How can I protect my Discord account from these attacks?

    Utilizing two-factor authentication, being cautious with invite links, and maintaining updated security software can help safeguard your account.

    Question 3: What should I do if I suspect I’ve fallen victim to such a cyber attack?

    If you suspect you’ve been compromised, immediately disconnect from the internet, change passwords, and seek assistance from cybersecurity professionals.

    Following these guidelines not only boosts your digital security but also ensures a safer online experience, particularly on platforms susceptible to cyber threats.



    Read the original article

    0 Like this
    AsyncRAT Crypto delivers Discord Hijacking Invite Link Skuld Stealer targeting wallets
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleFile Data Is Harder to Manage and Defend
    Next Article Mastering ChatGPT Prompt Patterns: Templates for Every Use

    Related Posts

    Cyber Security

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Cyber Security

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    June 27, 2025
    Cyber Security

    A Future World Of AI-Driven Network Security Solutions

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.