Discord once again found to be hosting malware payloads

Malware
(Image credit: solarseven / Shutterstock)

Cybersecurity researchers have once again witnessed Discord being used to host malicious payloads during an investigation into the increasing use of HTML smuggling.

A previous report from Sophos researchers showed the popular gaming-centric messaging platform has unwittingly emerged as the cybercriminals' ally as a means to host and distribute malware.

Now, researchers at Menlo Security deconstructing a new attack have also found threat actors using Discord for hosting malicious payloads.

TechRadar needs yo...

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> <a href="https://project.tolunastart.com/tqsruntime/main?surveyData=LFFFsT0HpgsyUe0tTFumBJohXK8Sedt0ARpsCF4DRGR+oCoVbvd+2+d8+UNIIx4L" data-link-merchant="project.tolunastart.com"" target="_blank">Click here to start the survey in a new window <<

Named ISOMorph, the campaign uses HTML smuggling to drop the first stage malware through the web browser.

Attack the browser

The researchers explain that HTML smuggling helps deliver malware by effectively bypassing various network security solutions including sandboxes, legacy proxies, and firewalls

“We believe attackers are using HTML Smuggling to deliver the payload to the endpoint because the browser is one of the weakest links without network solutions blocking it,” notes Menlo Security in a blog post analyzing the ISOMorph campaign.

HTML Smuggling was also used in the most recent spear-phishing campaign by the Nobelium group, the threat actor which perpetrated the SolarWinds supply-chain attack.

Popular with web developers as a means to optimize file downloads, threat actors use HTML smuggling to bypass standard perimeter security, explains Menlo Security.

Once it’s in place, the dropper fetches the malicious payload and installs remote access trojans (RATs) that allow the attacker to use the infected machine for their illegitimate purposes.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.