Cybercriminals have found a new way to steal your Discord account using the npm open-source repository alongside a couple of malware variants.
As reported by Kaspersky, which first spotted the campaign it dubbed LofyLife, the criminals have created four malicious packages that spread two different malware variants: Volt Stealer, and Lofy Stealer.
These packages have been distributed through the repository, where they’re being adopted by various developers. Once integrated, the malware will seek to harvest different information from the victims, including Discord tokens, credit card information, and other types of sensitive, and potentially identifiable data.
Tracking password changes
VoltStealer is the one stealing Discord tokens from compromised endpoints. Besides that, it also grabs the victims’ IP addresses and uploads them via HTTP.
Lofy Stealer, on the other hand, has the ability to infect Discord client files and monitor the victims’ actions. It can track when the user logs in, changes their login details (both email and password), when they change or disable multi-factor authentication, or add a new payment method, including the details of the credit card. All of this data is then uploaded to a remote server.
Threat actors love attacking Discord, as it’s the go-to communications platform for developers, gamers, and blockchain and NFT aficionados. As such, it’s filled with potentially lucrative fraud opportunities.
- These are the best ID theft protection services right now
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.