SecurityCybersecurityDiscord Links Hijacked to Spread Crypto-Stealing Malware

Discord Links Hijacked to Spread Crypto-Stealing Malware

A sinister cyber campaign is hijacking expired Discord invite links to trick users into installing powerful malware—stealing crypto wallets, passwords, and browser data while hiding in plain sight.

Key Points at a Glance
  • Hackers exploit Discord’s vanity link system to redirect users to malicious servers
  • Payloads include AsyncRAT and a custom Skuld Stealer targeting crypto wallets
  • Social engineering trick called ClickFix convinces users to execute PowerShell malware
  • Malware exfiltrates stolen data via trusted platforms like GitHub and Discord

Cybercriminals have uncovered a subtle vulnerability in Discord’s invite system, and they’re using it to deliver some of the most dangerous malware targeting crypto wallets and personal data. Security experts at Check Point have sounded the alarm over a new campaign that takes expired or deleted Discord invite links—once seen as trustworthy—and reclaims them using Discord’s vanity link feature. The result? Unsuspecting users are being silently redirected into a trap.

The attackers aren’t just hijacking these links—they’re creating entire malicious servers that impersonate real communities. Once inside, users are asked to verify their identity via a sleek-looking interface. But that “Verify” button does more than it promises. Behind it lies ClickFix, a deceptive social engineering tactic that tricks users into running copied PowerShell commands. These commands download and launch malware from remote servers—unleashing AsyncRAT and Skuld Stealer onto the victim’s machine.

AsyncRAT, a powerful remote access trojan, gives hackers full control over the infected system. Using dead drop resolvers and Pastebin as a relay, it communicates with its command-and-control server under the radar. Meanwhile, the Skuld Stealer, written in Go, scours the device for Discord data, browser credentials, and most critically, cryptocurrency wallet information. It’s designed to extract seed phrases and replace legitimate crypto wallet files like those used by Exodus and Atomic with trojanized versions sourced from GitHub.

To make detection even harder, the entire malware delivery and data exfiltration chain uses familiar cloud platforms like GitHub, Bitbucket, Pastebin, and even Discord’s own webhook API. That means most traffic looks completely legitimate to antivirus programs and firewalls.

The scope of this operation is vast. One variant of the loader was disguised as a game hacktool, downloaded hundreds of times from Bitbucket. Victims are spread across the U.S., Europe, and Asia, signaling a globally coordinated effort. Discord has since disabled the malicious bot used to facilitate the attack, but the vulnerability in link reuse remains unpatched—leaving the door open for future campaigns.

This campaign reveals the risks lurking in the overlooked corners of digital infrastructure. A seemingly harmless expired invite link can become the starting point for full system compromise. For crypto holders and casual Discord users alike, vigilance is no longer optional.


Source: The Hacker News

Enjoying our articles?
We don’t show ads — so you can focus entirely on the story, without pop-ups or distractions. We don’t do sponsored content either, because we want to stay objective and only write about what truly fascinates us. If you’d like to help us keep going — buy us a coffee. It’s a small gesture that means a lot. Click here – Thank You!

Jacob Reed
Jacob Reed
A practical analyst specializing in cybersecurity. Delivers technical expertise with clarity and focus.

More from author

More like this

Quantum Randomness Goes Public: How NIST Built a Factory for Unbreakable Numbers

The most secure random numbers ever made—straight from a quantum lab to the public. Discover how NIST’s beacon turns quantum weirdness into the new standard for security and trust.

Nation-State Hackers Used ChatGPT to Build Malware

State-backed hackers used ChatGPT to refine malware, automate surveillance, and probe U.S. infrastructure. AI has entered the cyberwar zone.

ChatGPT Logs Court Order Sparks Global Privacy Uproar

A sweeping court order forcing OpenAI to retain all ChatGPT logs—including deleted ones—is sending shockwaves through the tech world and raising urgent privacy alarms.

Why AI Needs Leashes, Not Just Guardrails

A bold proposal suggests we stop building guardrails around AI and start putting it on a leash. Could flexible regulation be the key to safety and innovation?

Latest news

Work Without Worry: How AI Is Changing Well-Being in Modern Offices

Is AI in your office friend or foe? A major global study finds that artificial intelligence can boost well-being and satisfaction—if implemented with people in mind.

Quantum Randomness Goes Public: How NIST Built a Factory for Unbreakable Numbers

The most secure random numbers ever made—straight from a quantum lab to the public. Discover how NIST’s beacon turns quantum weirdness into the new standard for security and trust.

Genesis Waters: How Early Microbes Forged the Path for All Life on Earth

Earth’s earliest microbes shaped the planet and the future of life itself. Discover the explosive breakthroughs that reveal where we came from—and where we might be headed.

From Deadly Fungus to Cancer Fighter: Scientists Transform Nature’s Toxin into a New Drug

What if a fungus blamed for ancient tomb deaths could fight cancer? Discover how Penn engineers turned deadly Aspergillus flavus into a potent leukemia drug—and why it’s just the beginning for fungal medicines.

Revolutionary Magnet Designs: Compact Rings Create Strong, Uniform Fields

A new generation of compact magnet rings generates uniform, powerful fields—no superconductors needed. Discover the design reshaping MRI and beyond.

Unlocking the Alzheimer’s Puzzle: How Insulin Resistance and APOE Disrupt the Brain’s Barrier

Alzheimer’s may begin with a breach in the brain’s own defenses. Discover how genetics and metabolism conspire at the blood-brain barrier—and what it means for the future of dementia care.

Acid Bubbles Revolutionize CO2-to-Fuel: The Simple Hack Extending Green Tech’s Lifespan

Could a simple acid bubble be the key to stable, industrial-scale CO2-to-fuel technology? Discover the fix that keeps green reactors running for months instead of days.

Aging Cells Revealed: How Electrical Signals Can Spot Senescence in Human Skin

Imagine detecting aging skin cells without any labels or stains. Discover how electrical signals can identify senescent cells in real time—and why it’s a game changer for medicine and anti-aging science.

The Secret Advantage: What the Human Brain Can Do That AI Can’t

Can AI ever truly ‘see’ the world like we do? Explore new research showing why human brains remain unbeatable when it comes to recognizing what’s possible in any environment.

Listening to the Universe’s First Light: New Radio Signals Reveal Ancient Stars

How can radio waves from the dawn of time reveal secrets about the universe’s very first stars? Discover how astronomers are listening to the earliest cosmic signals—and what it means for our understanding of the cosmos.