Article Details
Scrape Timestamp (UTC): 2025-10-26 14:29:44.003
Original Article Text
Click to Toggle View
Hackers steal Discord accounts with RedTiger-based infostealer. Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and payment information. The malware can also steal credentials stored in the browser, cryptocurrency wallet data, and game accounts. RedTiger is a Python-based penetration testing suite for Windows and Linux that bundles options for scanning networks and cracking passwords, OSINT-related utilities, Discord-focused tools, and a malware builder. RedTiger's info-stealer component offers the standard capabilities of snatching system info, browser cookies and passwords, crypto wallet files, game files, and Roblox and Discord data. It can also capture webcam snapshots and screenshots of the victim's screen. Although the project marks its dangerous functions as "legal use only" on GitHub, its free and unconditional distribution and the lack of any safeguards allow easy abuse. According to a report from Netskope, threat actors are now abusing RedTiger's info-stealer component, primarily for targeting French Discord account holders. The attackers compiled RedTiger's code using PyInstaller to form standalone binaries and gave those gaming or Discord-related names. Once the info-stealer is installed on the victim's machine, it scans for Discord and browser database files. It then extracts plain and encrypted tokens via regex, validates the tokens, and pulls the profile, email, multi-factor authentication, and subscription information. Next, it injects custom JavaScript into Discord's index.js to intercept API calls and capture events such as login attempts, purchases, or even password changes. It also extracts payment information (PayPal, credit cards) stored on Discord. From the victim's web browsers, RedTiger harvests saved passwords, cookies, history, credit cards, and browser extensions. The malware also captures desktop screenshots and scans for .TXT, .SQL, and .ZIP files on the filesystem. After collecting the data, the malware archives the files and uploads them to GoFile, a cloud storage service that allows anonymous uploads. The download link is then sent to the attacker via a Discord webhook, along with the victim metadata. Regarding evasion, RedTiger is well-equipped, featuring anti-sandbox mechanisms and terminating when debuggers are detected. The malware also spawns 400 processes and creates 100 random files to overload forensic analysis. While Netskope has not shared explicit distribution vectors for the weaponized RedTiger binaries, some common methods include Discord channels, malicious software download sites, forum posts, malvertising, and YouTube videos. Users should avoid downloading executables or game tools like mods, "trainers," or "boosters" from unverified sources. If you suspect compromise, revoke Discord tokens, change passwords, and reinstall your Discord desktop client from the official site. Also, clear saved data from browsers and enable MFA everywhere. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Cybercriminals are leveraging the RedTiger tool to create an infostealer targeting Discord accounts, extracting sensitive data including payment information and browser-stored credentials.
The malware, based on a Python penetration testing suite, is misused to steal Discord tokens, browser passwords, cryptocurrency wallet data, and game account details.
Attackers compile RedTiger's code into standalone binaries, disguising them with gaming or Discord-related names to deceive users.
Once installed, the malware extracts and validates Discord tokens, intercepts API calls, and captures sensitive events like logins and purchases.
The infostealer archives collected data, uploading it to GoFile for anonymous access, with download links sent to attackers via Discord webhooks.
RedTiger employs anti-sandbox techniques and process overloads to evade detection, complicating forensic analysis.
Users are advised to avoid downloading unverified executables, revoke compromised tokens, change passwords, and enable multi-factor authentication to mitigate risks.