Saturday, March 1, 2025
HomeCyber Security NewsNew PySilon RAT Abusing Discord Platform to Maintain Persistence

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits the popular social platform Discord to maintain persistence on infected systems.

Discord, known for its real-time communication features, has become a hub for various communities beyond its gaming origins. However, its API capabilities have also made it a target for malicious activities.

Discord bots are automated programs that perform specific server tasks, ranging from server management to music playback.

As per reports by ASEC Lab, these bots are typically developed using programming languages like Python and JavaScript and interact with servers through the Discord API.

While they enhance user experience, they can also be manipulated for nefarious purposes.

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

PySilon Rat Abusing Discord

PySilon represents a concerning case where RAT malware is implemented using a Discord bot.

The full source code of this malware is available on GitHub, raising alarms about its potential spread. Communities on platforms like Telegram further facilitate its distribution and customization.

RAT Malware Builder Program
RAT Malware Builder Program

The PySilon builder allows users to customize the malware by specifying details such as the Server ID and bot token required for creating a Discord bot. This information is embedded into pre-written Python code and converted into an executable file using PyInstaller.

When executed on a victim’s PC, the malware creates a new channel on the attacker’s server. It sends initial system information, including IP address details, via chat. Each infected PC gets a dedicated channel, enabling the attacker to control it individually.

System Information Transmission
System Information Transmission

Upon execution, PySilon self-replicates in the user folder to ensure persistence. It adds to the system’s RUN registry key, guaranteeing execution at startup. The malware can also customize the folder name used for replication.

PySilon contains anti-virtual machine (VM) logic, which allows it to detect virtual environments and avoid execution within them.

Screen and audio recording files sent to the threat actor
Screen and audio recording files sent to the threat actor

Attackers can execute various commands through the created channels, enabling them to perform malicious activities such as:

  • Information Collection: The “Grab” command extracts personal data, including Discord tokens, browsing history, cookies, and passwords.
  • Screen and Audio Recording: The malware captures screen and audio data using Python modules like pyautogui and sound device.
  • Keylogging: It logs keystrokes and transmits them when the user presses “Enter.”
  • Folder Encryption: PySilon encrypts files using the Fernet algorithm, storing decryption keys in user folders without leaving ransom notes.
Encryption/decryption commands
Encryption/decryption commands

PySilon’s open-source nature makes it easy for threat actors to integrate its code into seemingly benign bots. Since data transmission occurs via official Discord servers used for legitimate bot functions, detecting such malware becomes challenging for users.

The rise of open-source projects like PySilon highlights a growing trend of exploiting popular cybercrime platforms.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...