Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025

A new way to test how well AI systems classify text | MIT News

August 15, 2025

Pebble’s smartwatch is back: Pebble Time 2 specs revealed

August 15, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
Cyber Security

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

MichaBy MichaJune 25, 2025No Comments4 Mins Read
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets


New Cyber Threat: Discord Invite Link Exploitation

In a groundbreaking revelation, cybersecurity experts have uncovered a sophisticated malware campaign targeting Discord, using its invitation system to deploy information stealers like Skuld and remote access trojans such as AsyncRAT. This article delves into the mechanics of this attack, the vulnerabilities of Discord’s invite system, and what users can do to protect themselves.

Understanding the Cyber Attack on Discord

Cybercriminals are exploiting a critical weakness in Discord’s invitation mechanism, enabling them to hijack expired or deleted invite links. According to a report from Check Point, attackers leverage vanity link registrations, allowing them to redirect users from trusted sources to harmful servers.

The Role of ClickFix Phishing Techniques

The attackers utilize a combination of advanced techniques including ClickFix phishing, multi-stage loaders, and time-based evasions. This stealthy delivery method ensures that users are unaware of the malware being introduced into their systems. Specifically, criminals are targeting cryptocurrency wallets through the customized Skuld Stealer, facilitating the extraction of sensitive user information.

Discord’s Invitation System: A Double-Edged Sword

The flaw lies in the ability to reuse expired or deleted codes in custom vanity invite links. This vulnerability poses a significant risk as trusted invite links, previously shared within communities, can lead to illegitimate Discord servers controlled by cybercriminals.

Consequences of Invite Link Hijacking

When users interact with these compromised links, they are often prompted to complete a verification process. This often includes authorizing a bot, leading them to a fake website containing a malicious “Verify” button.

How the Malicious Process Works

This verification process employs social engineering tactics to trick users into executing harmful commands. By clicking “Verify,” a JavaScript command is executed, copying a PowerShell command to the clipboard. Users are then instructed to run a PowerShell command that ultimately downloads the AsyncRAT trojan and Skuld Stealer from a remote server.

The Attack’s Multi-Stage Nature

At its core, the attack is a meticulously planned, multi-stage process designed not only for precision but also to evade security checks. The AsyncRAT malware provides comprehensive remote access capabilities, while the Skuld Stealer focuses on collecting sensitive information from various platforms, including crypto wallets and gaming platforms.

Technical Features of the Malware

One of the notable features of the Skuld Stealer is its ability to harvest crypto wallet seed phrases and passwords from applications like Exodus and Atomic. Utilizing wallet injection techniques, the malware replaces legitimate application files with trojanized versions obtained from repositories like GitHub.

Exfiltration via Trusted Platforms

The information gathered by these malicious programs is exfiltrated using trusted cloud services such as GitHub, Bitbucket, and Discord webhook, allowing attackers to blend in with normal internet traffic and avoid detection.

Recent Developments and Mitigation Strategies

Check Point has identified similar campaigns, including the distribution of malware disguised as a hack tool for unlocking pirated games, already downloaded hundreds of times. Users are advised to remain vigilant and follow best practices in cybersecurity to protect their assets.

Practical Tips for Users

  • Be Skeptical of Invite Links: Always verify the authenticity of Discord invite links before clicking.
  • Use Security Tools: Implement antivirus programs and firewalls to monitor network activity and block suspicious commands.
  • Enable Two-Factor Authentication: This adds an extra layer of protection, making unauthorized access considerably more challenging.

Conclusion: Staying Ahead of Cyber Threats

This latest campaign highlights the need for increased vigilance on platforms like Discord. With cybercriminals continuously developing new tactics to exploit even subtle features of platforms, users must remain informed and proactive in safeguarding their digital assets.

FAQ

Question 1: What kind of malware is being spread through Discord?

Attackers are primarily using AsyncRAT remote access trojans and Skuld information stealers targeting cryptocurrency wallets.

Question 2: How can I protect my Discord account from these attacks?

Utilizing two-factor authentication, being cautious with invite links, and maintaining updated security software can help safeguard your account.

Question 3: What should I do if I suspect I’ve fallen victim to such a cyber attack?

If you suspect you’ve been compromised, immediately disconnect from the internet, change passwords, and seek assistance from cybersecurity professionals.

Following these guidelines not only boosts your digital security but also ensures a safer online experience, particularly on platforms susceptible to cyber threats.



Read the original article

0 Like this
AsyncRAT Crypto delivers Discord Hijacking Invite Link Skuld Stealer targeting wallets
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleFile Data Is Harder to Manage and Defend
Next Article Mastering ChatGPT Prompt Patterns: Templates for Every Use

Related Posts

Cyber Security

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025
Cyber Security

Over $300 million in cybercrime crypto seized in anti-fraud effort

August 15, 2025
Cyber Security

Teenage Hacker Stole $243M In Bitcoin. How It Happened.

August 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.