Discord Turned Into an Info-Stealing Backdoor by New Malware – Digitalmunition

News Discord Turned Into an Info-Stealing Backdoor by New Malware

Published on October 24th, 2019 📆 | 1828 Views ⚑


Discord Turned Into an Info-Stealing Backdoor by New Malware


A new malware is targeting Discord users by modifying the Windows Discord client so that it is transformed into a backdoor and an information-stealing Trojan.

The Windows Discord client is an Electron application, which means that almost all of its functionality is derived from HTML, CSS, and JavaScript. This allows malware to modify its core files so that the client executes malicious behavior on startup.

Discovered by researcher MalwareHunterTeam earlier this month, this malware is called “Spidey Bot” and when installed will add its own malicious JavaScript to the %AppData%Discord[version]modulesdiscord_modulesindex.js and %AppData%Discord[version]modulesdiscord_desktop_coreindex.js files.

Modified Discord index.js file
Modified Discord index.js file

The malware will then terminate and restart the Discord app in order for the new JavaScript changes to be executed.

Once started, the JavaScript will execute various Discord API commands and JavaScript functions to collect a variety of information about the user that is then sent via a Discord webhook to the attacker.

Executing commands
Executing commands

The information that is collected and sent to the attacker includes:

  • Discord user token
  • Victim timezone
  • Screen resolution
  • Victim’s local IP address
  • Victim’s public IP address via WebRTC
  • User information such as username, email address, phone number, and more
  • Whether they have stored payment information
  • Zoom factor
  • Browser user agent
  • Discord version
  • The first 50 characters of the victims Windows clipboard

The contents of the clipboard is especially concerning as it could allow the user to steal passwords, personal information, or other sensitive data that was copied by the user.

After sending the information, the Discord malware will execute the fightdio() function, which acts as a backdoor.

This function will connect to a remote site to receive an extra command to execute. This allows the attacker to perform other malicious activity such as stealing payment information if it exists, executing commands on the computer, or potentially installing further malware.

The backdoor component
The backdoor component

Researcher and reverse engineer Vitali Kremez who also analyzed the malware told BleepingComputer that the infection has been seen using file names such as “Blueface Reward Claimer.exe” and “Synapse X.exe”. While it is not 100% sure how it is being spread, Kremez feels that the attacker is using Discord messaging to spread the malware.

As this infection shows no outward indication that it has been compromised, a user will have no idea they are infected unless they perform network sniffing and see the unusual API and web hook calls.

If the installer is detected and removed, the modified Discord files will still remain infected and continue to be executed each time you start the client. The only way to clean the infection will be to uninstall the Discord app and reinstall it so that the modified files are removed.

Even worse, after over two weeks, this Discord malware still only has 24/65 detections on VirusTotal.

Source link

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *