Friday, May 9, 2025
HomeComputer SecurityDozen of Malicious NPM Packages Caught Hijacking Discord Servers

Dozen of Malicious NPM Packages Caught Hijacking Discord Servers

Published on

SIEM as a Service

Follow Us on Google News

The Node Package Manager (npm) security team has nearly extracted 17 JavaScript libraries with the malicious code, and these were caught hijacking the Discord servers. 

All these malicious codes are specifically designed to steal Discord access tokens and environment variables from the victim’s computers. But, the experts affirmed that they have luckily removed the malicious code before causing a lot of damages.

After investigating the codes, among the 17 JavaScript, 4 of the libraries contained the capability to accumulate Discord access tokens. However, these tokens will later act as authentication cookies, enabling the threat actors to hijack the developer Discord accounts easily.

- Advertisement - Google News

Stealing Discord Tokens

Now the question arises that why the threat actors are stealing Discord tokens? Discord is a universal digital communication medium that has nearly 350 million registered users that allows communication through:- 

  • Voice calls
  • Video calls
  • Text messaging
  • Media files

And all these were done by the threat actors either privately or within a constant virtual room named “servers.”

Enticing Reasons

Some reasons will clarify why threat actors target Discord tokens, and that’s why here we have mentioned them below:-

  • Using the medium as part of an attack
  • Spreading malware to Discord users
  • Selling stolen premium accounts

Payloads

Here are the payloads used by the threat actors:-

  • Discord token grabber
  • PirateStealer
  • Environment variable stealer
  • Remote Access Trojan (RAT)

The fifth npm package included PirateStealer; this malware is specifically used for removing all the data like payment card details, credentials, and personal information from applications and Discord accounts.

However, after stealing the credentials, the app code then “spies” on the user, and later it transmits all the stolen data to a hardcoded address. Among all the 17 Javascript libraries, the experts found a total of 11 Environment variable stealers.

While the Discord token grabber is very stealthy since they are less caught or detected by the AV tools, as it does not do the following things:-

  • Do not register itself anywhere.
  • Do not modify any files.
  • Do not perform suspicious operations.

Package Repositories in The Crosshairs

Malicious packages are quite common for cyberattacks, and that’s why the threat actor has detected such packages in different attacks that we have mentioned below:-

  • In December, two of the software packages were taken offline of RubyGems, an open-source package repository and manager, as they have been attacked with Bitcoin-stealing malware.
  • The experts found other Discord-stealing malware in January.
  • The experts again detected a malicious package attacking Amazon, Slack, Lyft, and Zillow in March.
  • In June, the security experts detected the crypto miners group that penetrated the Python Package Index (PyPI).
  • A credentials-stealing package has been also detected in July that utilizes the legitimate password-recovery tools in Google’s Chrome.

These kinds of attacks are getting quite common, as the threat actors are using these methods in different cyberattacks. As they operate public hack tools with small modifications which are confused using public obfuscators.

A huge number of malicious npm and PyPI packages has been detected that are stealing Discord access tokens. These attacks are increasing rapidly due to which the experts are trying their best to overcome this kind of attack.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Host Header Injection to Breach Web Applications

Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known...

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows...

Researchers Uncover Remote Code Execution Flaw in macOS – CVE-2024-44236

Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed...

Apache ActiveMQ Vulnerability Allows Attackers to Induce DoS Condition

Critical vulnerability in Apache ActiveMQ (CVE-2024-XXXX) exposes brokers to denial-of-service (DoS) attacks by allowing...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Host Header Injection to Breach Web Applications

Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known...

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows...

Researchers Uncover Remote Code Execution Flaw in macOS – CVE-2024-44236

Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed...