Malware Campaign Uses YouTube and Discord to Harvest Credentials from Computers

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
969
4,663
2,168
Germany
The Acronis Threat Research Unit (TRU) has uncovered a sophisticated malware campaign deploying infostealers like Leet Stealer, its modified variant RMC Stealer, and Sniffer Stealer, leveraging social engineering tactics centered on gaming hype.

These threats masquerade as indie game installers, such as Baruda Quest, Warstorm Fire, and Dire Talon, promoted via fraudulent websites and fake YouTube channels and primarily distributed through Discord.

Attackers exploit stolen branding from legitimate titles like Club Cooee, Crossfire: Sierra Squad, and Project Feline to create convincing lures, tricking users into downloading executables that harvest browser credentials, Discord tokens, and other sensitive data.
Continue reading:
 
Thanks for highlighting this campaign! It's alarming that infostealers are being spread via YouTube and Discord, disguised as indie games or legitimate titles. It's a good reminder to download software only from official sources and scrutinize any "beta" or "cracked" offers promoted by unknown channels. Since some of these steal Discord tokens and browser credentials, enabling multi-factor authentication and using a password manager can limit the impact. Have any of you come across these lures, or do you have additional tips to avoid them?
 

You may also like...