New Malware Attack Exploits YouTube Channels and Discord to Steal Credentials from PCs

A recent wave of sophisticated malware campaigns has been uncovered by the Acronis Threat Research Unit (TRU), highlighting evolving attack techniques that blend fake indie game hype, social engineering, and hijacked branding to compromise Windows systems.

Campaigns distributed via fraudulent websites, YouTube channels, and primarily Discord leverage three Electron-based stealer families.

Malicious Campaigns Hijack Indie Game Hype

Leet Stealer, its customized variant RMC Stealer, and the independently developed Sniffer Stealer.

Malware Campaign
Stealers traced back to Fewer Stealer

The attackers target gamers with fake installers disguised as unreleased or early-access indie games such as Baruda Quest, Warstorm Fire, Dire Talon, and WarHeirs, using legitimate branding assets stolen from popular titles to foster trust.

Distribution is driven by engaging promotional content including fabricated websites, stolen game artwork, and lively YouTube trailers for games that, in reality, do not exist.

Download links are often routed through Discord, where the gaming community readily shares beta access files and new game announcements.

To further the illusion, Android and macOS downloads from these fake sites redirect to legitimate unrelated software, while Windows downloads deploy the actual malicious payload.

The campaign’s primary goal is to harvest sensitive user data including browser credentials, Discord tokens, payment details, cryptowallets, and private messages through clever exploitation of the Electron framework for cross-platform desktop apps.

Advanced Stealer Functionality

Technical investigation revealed that Leet Stealer, first appearing in late 2024 as a “malware-as-a-service,” underpins much of this activity and has spawned numerous derivatives.

RMC Stealer, for example, was created as a custom modification for threat actors, confirmed through code overlap.

Attackers distribute their wares for a recurring subscription fee via Telegram channels and offer bespoke versions on request.

While Leet Stealer and its variants are closely related, Sniffer Stealer appears to be developed independently, though sharing many common behaviors and targeting goals.

A key discovery occurred when TRU researchers found that the Baruda Quest sample inadvertently included the original, unobfuscated source code within its Electron ASAR archive providing rare insights into the malware’s construction.

Malware Campaign
Source code for sale

The executable itself, a bloated NSIS installer exceeding 80MB, enjoys a very low detection rate among antivirus solutions, mainly due to its size and the inherent obfuscation provided by embedding the Electron runtime and JavaScript bytecode.

Once extracted, analysis shows robust sandbox detection mechanisms, which examine virtual machine artifacts and hardware configurations to thwart security researchers.

Should the malware sense a sandbox, it generates a convincing error message, mimicking game crashes or misconfigurations to avoid suspicion.

Upon successful execution, the malware aggressively harvests browser data including cookies, passwords, and form data from all major Chromium-based browsers.

Leveraging browser debug mode, it extracts credentials and compresses stolen data for exfiltration via third-party file sharing services such as gofile.io, file.io, catbox.moe, and tmpfiles.org.

Discord credential theft is a prime focus; stolen tokens enable attackers to impersonate victims, propagate malware further, scam users, and, in some cases, extort victims for account access.

In addition to Discord, the stealers target Microsoft, Steam, Epic Games, Growtopia, MineCraft, WhatsApp, Telegram, and unofficial Discord modifications like BetterDiscord.

Further, these threats can download and execute additional malicious payloads, demonstrating a modular design adaptable to ongoing campaigns.

Notably, evidence points to a Brazilian origin for the campaign; many default languages are set to Portuguese, and virus submission telemetry shows a predominance of victims in Brazil, with a significant footprint in the United States, likely owing to Discord’s global user base.

According to the report, These attacks mark a significant evolution in stealer campaigns, leveraging both technical and psychological manipulation to maximize reach and effectiveness.

Electron-based architecture enables cross-platform deployment, while social engineering and credible branding hoodwink even savvy gamers.

With the rapid spread of malware via Discord and YouTube, vigilance and enhanced endpoint protection are crucial, as traditional detection engines lag in identifying such threats.

Indicators of Compromise (IOC)

FilenameStealer FamilySHA256
babacan32 Setup 1.0.0.exeLeet5c7c70ab9734838795050a91f08f1af9e3cb479caf20bd34944282e8ac455ea7
BarudaQuest.exeRMC813e5923e6d4df56055f5b5200db2e074e89f64dea3099e61fbde78c0fc23597
BillieBust.exeSniffer567fb96e8b101abc45f2dfba470ea8a7298063f7428409d8b7e5c8f4326b6dc0
Brosxa 1.0.0.exeLeetb9adcf54b09475ed2023f5b3c03e23013e65195b4e8bfbb82c8c13fde194b2d4
Depthcan.exeLeet798eee15a3e93ee0d261501df979dc3b61a9e5992188edeada5beaba0b30b8df
DireTaloGaSetup.exeSniffer35ad1623694496ec91bc853b391c8bebdfa1aeaea2c4dcf74516e2cd13ab44f4
Sokakcan.exeLeeta3636b09302a77ed7a6c75c5e679ba9ed0dbe12892f5fe94975ab3ef6be7ade8
SpectraLauncher.exeSniffercee750d6cb834b766a214b6609ed4eca62b0330a9904cf2f77b184a77e70f4d3
SteppulGame.exeLeet6f441dc6a45fd6dac4fe19707c6338b8bca1aabfb7842d7ebf94fb2fab2f12d5
SumaleDepth Setup 1.0.0.exeLeet051028c2acc74cb55f5a5e28c7ba1613fd4a13dcf5f6a6325557ae1b88900ee8
Terrnua Setup 1.0.0.exeLeet767f575d30deb66244b29bafae51111fdb869ba26d1df902e3f839bdb64725f9

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here