Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Malicious

Expired Discord link
Gaming Gear

Malicious Discord invites are targeting gamers with fake servers, stolen wallets, and malware disguised as game hacks

by admin June 21, 2025



  • Cybercriminals are recycling expired Discord links to launch silent, devastating multi-stage malware attacks
  • A fake Discord bot tricks users into running PowerShell commands disguised as CAPTCHA fixes
  • Old community invite links now lead to malware servers stealing your data and digital assets

Cybercriminals are increasingly exploiting a lesser-known flaw in Discord’s invitation system to target unsuspecting users, particularly gamers, new research has claimed.

A report from researchers from Check Point found attackers manage to register previously valid invite links with custom vanity URLs.

The tactic involves hijacking once legitimate and trusted expired or deleted Discord invite links and redirecting them to malicious servers hosting multi-stage malware campaigns.


You may like

From trusted links to dangerous redirects

These hijacked links, often embedded in old forum posts, community pages, or social media, are being used to silently funnel users to Discord servers operated by threat actors.

Once on these fake servers, users are greeted with what appears to be a standard verification process.

A bot named “Safeguard” prompts visitors to click a “Verify” button, which initiates an OAuth2 process and redirects them to a phishing site.

The site employs a social engineering method called “ClickFix,” where users are tricked into copying and running a PowerShell command under the guise of fixing a broken CAPTCHA.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

This action silently launches the malware installation chain, with the attackers using cloud services such as Pastebin, GitHub, and Bitbucket to deliver the payloads in multiple stages, allowing them to blend into normal network traffic.

Initial scripts download executables that retrieve further encrypted payloads, which include AsyncRAT, a tool that gives attackers remote control over infected systems, and a tailored variant of the Skuld Stealer designed to extract credentials and cryptocurrency wallet data.

Gamers have become a prime target, with campaigns even disguising malware as tools like The Sims 4 DLC unlockers – one archive named Sims4-Unlocker.zip was downloaded over 350 times, highlighting the campaign’s reach.

Through clever evasion techniques such as delayed execution and command-line argument checks, the malware often bypasses detection from even the best antivirus software.

The threats extend beyond typical malware infections. The Skuld Stealer used in these attacks can extract crypto wallet seed phrases and passwords, effectively granting full control over victims’ digital assets.

Considering the focus on cryptocurrency theft and credential harvesting, individuals should reinforce their defenses with robust identity theft protection services.

These tools can monitor for unauthorized use of personal information, alert users to breaches, and assist in recovering compromised digital identities.

While some might assume that endpoint protection tools would shield them from these tactics, the multi-layered, modular structure of the attack often flies under the radar.

To stay safe, users must be wary of Discord invite links, especially those embedded in old content. Also, avoid running unexpected scripts or following suspicious verification steps.

You might also like



Source link

June 21, 2025 0 comments
0 FacebookTwitterPinterestEmail
Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
Product Reviews

Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

by admin June 7, 2025


For years, gray-market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain web infrastructure with no questions asked. But as global law enforcement scrambles to crack down on digital threats, they have developed strategies for getting customer information from these hosts and have increasingly targeted the people behind the services with indictments. At the cybercrime-focused conference Sleuthcon in in Arlington, Virginia, today, researcher Thibault Seret outlined how this shift has pushed both bulletproof hosting companies and criminal customers toward an alternative approach.

Rather than relying on web hosts to find ways of operating outside law enforcement’s reach, some service providers have turned to offering purpose-built VPNs and other proxy services as a way of rotating and masking customer IP addresses and offering infrastructure that either intentionally doesn’t log traffic or mixes traffic from many sources together. And while the technology isn’t new, Seret and other researchers emphasized to WIRED that the transition to using proxies among cybercrminals over the last couple of years is significant.

“The issue is, you cannot technically distinguish which traffic in a node is bad and which traffic is good,” Seret, a researcher at the threat intelligence firm Team Cymru, told WIRED ahead of his talk. “That’s the magic of a proxy service—you cannot tell who’s who. It’s good in terms of internet freedom, but it’s super, super tough to analyze what’s happening and identify bad activity.”

The core challenge of addressing cybercriminal activity hidden by proxies is that the services may also, even primarily, be facilitating legitimate, benign traffic. Criminals and companies that don’t want to lose them as clients have particularly been leaning on what are known as “residential proxies,” an array of decentralized nodes that can run on consumer devices—even old Android phones or low-end laptops—offering real, rotating IP addresses assigned to homes and offices. Such services offer anonymity and privacy, but can also shield malicious traffic.

By making malicious traffic look like it comes from trusted consumer IP addresses, attackers make it much more difficult for organizations’ scanners and other threat detection tools to spot suspicious activity. And, crucially, residential proxies and other decentralized platforms that run on disparate consumer hardware reduce a service provider’s insight and control, making it more difficult for law enforcement to get anything useful from them.

“Attackers have been ramping up their use of residential networks for attacks over the last two to three years,” says Ronnie Tokazowski, a longtime digital scams researcher and cofounder of the nonprofit Intelligence for Good. “If attackers are coming from the same residential ranges as, say, employees of a target organization, it’s harder to track.”

Criminal use of proxies isn’t new. In 2016, for example, the US Department of Justice said that one of the obstacles in a years-long investigation of the notorious “Avalanche” cybercriminal platform was the service’s use of a “fast-flux” hosting method that concealed the platform’s malicious activity using constantly changing proxy IP addresses. But the rise of proxies as a gray-market service rather than something attackers must develop in-house is an important shift.

“I don’t know yet how we can improve the proxy issue,” Team Cymru’s Seret told WIRED. “I guess law enforcement could target known malicious proxy providers like they did with bulletproof hosts. But in general, proxies are whole internet services used by everyone. Even if you take down one malicious service, that doesn’t solve the larger challenge.”



Source link

June 7, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (966)
  • Esports (732)
  • Game Reviews (681)
  • Game Updates (850)
  • GameFi Guides (958)
  • Gaming Gear (916)
  • NFT Gaming (941)
  • Product Reviews (907)
  • Uncategorized (1)

Recent Posts

  • Ethereum Bets See Unusually High $400M Liquidations as Some Now Target $10K ETH
  • $50,715,884 XRP Hits Coinbase as Ripple Case Finally Closed
  • Climate Change Is Bringing Legionnaire’s Disease to a Town Near You
  • All maps in current pool
  • Here Are 4 Major XRP Developments You Might Have Missed This Week

Recent Posts

  • Ethereum Bets See Unusually High $400M Liquidations as Some Now Target $10K ETH

    August 23, 2025
  • $50,715,884 XRP Hits Coinbase as Ripple Case Finally Closed

    August 23, 2025
  • Climate Change Is Bringing Legionnaire’s Disease to a Town Near You

    August 23, 2025
  • All maps in current pool

    August 23, 2025
  • Here Are 4 Major XRP Developments You Might Have Missed This Week

    August 23, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Ethereum Bets See Unusually High $400M Liquidations as Some Now Target $10K ETH

    August 23, 2025
  • $50,715,884 XRP Hits Coinbase as Ripple Case Finally Closed

    August 23, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close