Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Old Discord Links Now Lead To Malware

June 13, 2025
Reading Time: 2 mins read
in Alerts
VexTrio TDS Uses Adtech To Spread Malware

A sophisticated new attack vector exploits a critical flaw in Discord’s invitation system, allowing attackers to hijack expired invite links. This emerging threat leverages the trusted nature of Discord to silently compromise victims through previously legitimate invitation links. The attack chain begins when threat actors exploit Discord’s custom vanity invite link system, which is available to premium servers. When legitimate servers lose their boost status or links expire, the invitation codes become available for reuse by malicious actors. This creates a dangerous scenario where users clicking trusted links are unknowingly redirected to attacker-controlled Discord servers designed to appear legitimate.

Check Point researchers identified this active malware campaign in June 2025, uncovering how attackers weaponized the Discord vulnerability.

The campaign demonstrates remarkable technical sophistication, combining the ClickFix phishing technique with multi-stage loaders and time-based evasions. This combination is used to stealthily deliver AsyncRAT, a powerful remote access trojan, alongside a customized variant of Skuld Stealer. What makes this operation particularly insidious is that payload delivery and data exfiltration occur exclusively via trusted cloud services. This allows malicious traffic to blend seamlessly with normal network activity and avoid raising security alarms, making it very hard to detect.

The infection mechanism employed in this campaign represents a masterclass in social engineering, utilizing a refined technique known as ClickFix.

Once users join the hijacked Discord server, they encounter what appears to be a legitimate verification process managed by a bot. When victims click the verification button, they are redirected to an external phishing website that presents a sophisticated replica of Discord’s interface. The site displays a fake Google CAPTCHA that appears to fail, prompting users to perform manual “verification” steps to proceed. The JavaScript on this malicious page silently copies a PowerShell command to the user’s clipboard without their knowledge or any direct interaction.

The social engineering aspect is particularly effective because it presents users with familiar Windows instructions to follow to complete the process. This includes opening the Run dialog with Win+R, pasting the clipboard content, and then pressing Enter to finally execute the command. This command employs string reversal and Base64 decoding to obfuscate a Pastebin URL, which initiates the final malware infection chain. This approach cleverly eliminates the need for users to download or run files manually, removing common red flags that might alert security-conscious individuals. The campaign’s scale is significant, with potential victims exceeding 1,300 across multiple countries, including the United States, Vietnam, and Germany.

Reference:

  • New Discord Scam Hijacks Old Invite Links To Push RATs Via Fake CAPTCHAs
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityFIN6June 2025More Eggs
ADVERTISEMENT

Related Posts

Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025
Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025

Latest Alerts

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Subscribe to our newsletter

    Latest Incidents

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial