Hackers Abuse Discord Invite to Spread Malicious Links and Deliver AsyncRAT

Threat actors are exploiting Discord’s trusted invite infrastructure to redirect users to malicious servers and deploy advanced malware, including the infamous AsyncRAT remote access trojan and Skuld stealer.

This campaign leverages Discord’s popularity among gamers, crypto communities, and developers, turning the platform’s own features such as vanity invites and server boosts into vectors for phishing, credential theft, and malware distribution.

Technical Abuse of Discord Vanity

Discord allows servers with high community engagement (Level 3 Boost) to claim custom vanity invite codes.

AsyncRAT
Misleading Behavior in Invite Code Settings

Attackers are capitalizing on a crucial loophole: when a legitimate server’s permanent invite code expires or becomes unclaimed (often due to a downgrade or expiration of Boost status), adversaries quickly re-register the same code for attacker-controlled servers.

AsyncRAT
Permanent Discord invite links

This enables adversaries to hijack established, trusted invite URLs found on blogs, community sites, and social media, invisibly redirecting future visitors to their own malicious Discord instance.

Exploiting Discord clients’ inconsistent invite management, attackers also take advantage of user misconceptions: users frequently believe that setting an invite to “never expire” confers permanence to any invite, but this only applies to newly generated permalinks.

When the original invite lapses, attackers monitor and claim the code, subsequently propagating phishing and malware payloads.

Once lured into the attacker’s Discord server, victims typically see only a single channel often named #verify.

Here, a malicious custom bot (posing as “Safeguard” or similar) prompts users to click a “Verify” button.

According to Dark Atlas Report, this button redirects them to a phishing website (e.g., captchaguard[.]me), masquerading as a legitimate verification or CAPTCHA portal.

Exploiting the OAuth2 authentication workflow, the phishing site tricks users into authorizing access, harvesting sensitive tokens and account metadata.

The fake portal mimics Discord’s UI, displaying a final “Verify” button activating malicious JavaScript that copies a PowerShell downloader command to the clipboard.

Unsuspecting users, often misled by instructions, run this code, initiating the malware infection chain.

Malware Payloads

The primary malware delivered is AsyncRAT (v0.5.8), a powerful open-source remote access trojan with capabilities including command execution, keylogging, remote desktop, and persistent surveillance.

This variant uses a “dead drop” resolver, dynamically downloading its Command and Control (C2) address from Pastebin, further complicating detection and takedown efforts. Additionally, a tailored version of the Skuld stealer is deployed.

Written in Go, Skuld targets browser credentials, Discord tokens, and cryptocurrency wallet secrets, specifically attacking local Exodus and Atomic wallet installations with malicious .asar JavaScript injections.

Stolen seed phrases and passwords are silently exfiltrated via Discord webhook endpoints, with the malware employing mutex logic to evade redundant infections.

This campaign stands out for its modular, multi-stage delivery mechanism utilizing trusted platforms such as GitHub, Bitbucket, and Pastebin for payload hosting and execution.

By leveraging scheduled tasks for persistence and ChromeKatz for in-memory cookie theft (circumventing Chrome’s ABE), the attackers maintain robust access while keeping detection rates low.

Campaign analysis reveals over 1,300 payload downloads, with infections reported across the U.S., Europe, and Asia.

The focus on cryptocurrency wallet theft and Discord credential compromise underscores the extensive financial motivation and operational sophistication behind these operations.

The abuse of Discord’s invite and vanity link infrastructure presents a potent and persistent threat for online communities.

Users are advised to verify the legitimacy of Discord invitations particularly those circulated on public sites and to exercise caution when directed to external verification portals.

Security teams should monitor for IOC activity, educate users on Discord invite risks, and proactively hunt for webhook- and Pastebin-based exfiltration patterns.

Indicators of Compromise (IOCs)

TypeValueDescription
SHA25653b65b7c38e3d3fca465c547a8c1acc53c8723877c6884f8c3495ff8ccc94fbeAsyncRAT Sample 1
SHA256d54fa589708546eca500fbeea44363443b86f2617c15c8f7603ff4fb05d494c1AsyncRAT Sample 2
SHA2568135f126764592be3df17200f49140bfb546ec1b2c34a153aa509465406cb46cSkuld Stealer Variant
SHA256160eda7ad14610d93f28b7dee20501028c1a9d4f5dc0437794ccfc2604807693Downloader (Updated)
IP101.99.76.120:7707AsyncRAT C2
IP87.120.127.37:7707, 185.234.247.8:7707AsyncRAT C2 Servers
Domainmicroads[.]topAsyncRAT C2 Domain
URLhttps://captchaguard[.]me/?key=Phishing / Credential Harvest Site
URLhttps://pastebin[.]com/raw/ftknPNF7AsyncRAT Dead Drop Resolver
URLhttps://bitbucket[.]org/syscontrol6/syscontrol/downloads/cks.exeMalware Payload
Webhookhttps://discord[.]com/api/webhooks/1355186248578502736/_RDywh_K6…Data Exfiltration (Skuld Stealer)
Webhookhttps://discord[.]com/api/webhooks/1348629600560742462/RJgSAE7c…Crypto Wallet Seeds Exfiltration
GitHub Loaderhttps://github[.]com/frfs1/update/raw/refs/heads/main/installer.exeInitial Installer
Bitbucket Loaderhttps://bitbucket[.]org/updatevak/upd/downloads/skul.exeSkuld Stealer Binary

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here