Welcome to the IKCEST
Hackers have turned Discord into an account stealer - here's what you need to know
(Image credit: Shutterstock / Konstantin Savusia)

Researchers have uncovered a new malware campaign that turns popular gaming chat service Discord into a dangerous account stealer.

Discovered by MalwareHunterTeam, the NitroHack malware masquerades as a software crack that gives users free access to Discord Nitro, the service’s premium subscription tier.

However, upon installation, the malware modifies the Discord client for Windows, turning it into a trojan capable of stealing account credentials and financial information, and then attempts to transmit itself to the victim’s friends and communities.

The malware also reportedly affects users of the Discord web client.

Discord hacked

Discord actively encourages its users to code in new functionality to enhance their experience with the client. JavaScript-coded ‘Discord Bots’ range from the extremely useful (e.g. the ability to accept donations on behalf of a community) to the beautifully trivial (e.g. enhanced meme-sharing).

However, this level of openness also means the client is susceptible to modification attacks. The NitroHack malware tweaks a piece of JavaScript code stored locally on the victim’s computer, and also attempts to introduce malicious code to the same file in alpha and public test builds of the client.

The malware is also persistent, prompting Discord to deliver the victim’s login credentials to the hacker each time the client is booted up, and transmits itself to a victim’s friends via direct message.

In a bid to steal credit card information, meanwhile, the malware hunts for saved payment details attached to the infected user’s account.

NitroHack is also able to evade security software, which might recognize and address the malicious executable file, but is unlikely to register the modification of the Discord client.

Users can check whether their client has been compromised by opening %AppData%\\Discord\0.0.306\modules\discord_voice\index.js using Notepad or a similar software. If unmodified, the file should end with “module.exports = VoiceEngine;”.

Via Bleeping Computer

Original Text (This is the original text for your reference.)

(Image credit: Shutterstock / Konstantin Savusia)

Researchers have uncovered a new malware campaign that turns popular gaming chat service Discord into a dangerous account stealer.

Discovered by MalwareHunterTeam, the NitroHack malware masquerades as a software crack that gives users free access to Discord Nitro, the service’s premium subscription tier.

However, upon installation, the malware modifies the Discord client for Windows, turning it into a trojan capable of stealing account credentials and financial information, and then attempts to transmit itself to the victim’s friends and communities.

The malware also reportedly affects users of the Discord web client.

Discord hacked

Discord actively encourages its users to code in new functionality to enhance their experience with the client. JavaScript-coded ‘Discord Bots’ range from the extremely useful (e.g. the ability to accept donations on behalf of a community) to the beautifully trivial (e.g. enhanced meme-sharing).

However, this level of openness also means the client is susceptible to modification attacks. The NitroHack malware tweaks a piece of JavaScript code stored locally on the victim’s computer, and also attempts to introduce malicious code to the same file in alpha and public test builds of the client.

The malware is also persistent, prompting Discord to deliver the victim’s login credentials to the hacker each time the client is booted up, and transmits itself to a victim’s friends via direct message.

In a bid to steal credit card information, meanwhile, the malware hunts for saved payment details attached to the infected user’s account.

NitroHack is also able to evade security software, which might recognize and address the malicious executable file, but is unlikely to register the modification of the Discord client.

Users can check whether their client has been compromised by opening %AppData%\\Discord\0.0.306\modules\discord_voice\index.js using Notepad or a similar software. If unmodified, the file should end with “module.exports = VoiceEngine;”.

Via Bleeping Computer

Comments

    Something to say?

    Log in or Sign up for free

    Disclaimer: The translated content is provided by third-party translation service providers, and IKCEST shall not assume any responsibility for the accuracy and legality of the content.
    Translate engine
    Article's language
    English
    中文
    Pусск
    Français
    Español
    العربية
    Português
    Kikongo
    Dutch
    kiswahili
    هَوُسَ
    IsiZulu
    Action
    Related

    Report

    Select your report category*



    Reason*



    By pressing send, your feedback will be used to improve IKCEST. Your privacy will be protected.

    Submit
    Cancel