Hijacked Discord Links Deliver Multi-Stage AsyncRAT and Skuld Stealer Campaign

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

A significant vulnerability in Discord’s invitation system exposes users to sophisticated malware campaigns. Cybercriminals are exploiting expired and deleted Discord invite links, allowing attackers to redirect unsuspecting users to malicious servers.

Attackers capitalize on Discord’s custom “vanity” links, a feature available for servers with premium subscriptions. Once these links expire or become inactive due to a server losing its premium status, attackers hijack the URLs and redirect users to fake servers. 

Recent cybersecurity research by Check Point has uncovered that this campaign is characterized by its multi-stage infection chain, utilizing several evasion techniques to avoid detection by traditional antivirus software.

Attackers assign a previously used invite code from another server as a custom vanity invite link for a boosted server in the Discord application
Attackers assign a previously used invite code from another server as a custom vanity invite link for a boosted server in the Discord application | Source: CPR 

On these malicious servers, users often encounter seemingly legitimate channels with bots that prompt them to complete fake “verification” processes. These processes lead to phishing websites designed to trick users into executing malicious commands.

Malicious Discord server where users land after clicking a hijacked invite link
Malicious Discord server where users land after clicking a hijacked invite link | Source: CPR 

The campaign employs a blend of evasion tactics, including the ClickFix phishing technique, multi-stage loaders, and time-based mechanisms, to bypass security detection. 

The primary payloads delivered are AsyncRAT, a remote access trojan (RAT), and a tailored version of the Skuld Stealer, which is specifically designed to exfiltrate sensitive data like cryptocurrency wallet credentials. 

The malware achieves stealth by leveraging legitimate cloud services such as GitHub, Bitbucket, Pastebin, and Discord itself for payload delivery and data exfiltration, blending malicious activity into normal internet traffic.  

Notably, the operation has evolved to bypass security features like Chrome’s App Bound Encryption (ABE). By adapting tools like ChromeKatz, attackers can steal browser cookies directly from updated Chromium-based browsers such as Chrome, Edge, and Brave.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: