Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer

Posted on July 25, 2025July 25, 2025 By CWS

A newly uncovered marketing campaign is exploiting avid gamers’ enthusiasm for off-beat indie titles to plant credential-stealing malware on machines.

Branded installers for nonexistent video games corresponding to “Baruda Quest,” “Warstorm Fireplace,” and “Dire Talon” are pushed via slick YouTube trailers and Discord obtain hyperlinks that imitate official early-access promotions.

Promotional video (Supply – Acronis)

The lures include Electron-based executables weighing 80 MB or extra, a measurement that helps them evade informal inspection whereas bundling the Node.js runtime wanted to execute the assault code.

As soon as the sufferer clicks the Discord-hosted file, the installer launches a Nullsoft (NSIS) bundle that quietly extracts an app.asar archive holding the stealer’s JavaScript payload.

Acronis analysts famous that the operators typically forgot to strip the readable supply from this archive, giving defenders a uncommon, unobfuscated view of their techniques and code lineage, which traces again to the Fewer Stealer household.

Inside, researchers recognized three lively variants—Leet Stealer, its customised fork RMC Stealer, and an apparently impartial pressure dubbed Sniffer Stealer.

If the malware runs efficiently, it might probably siphon browser passwords, cookies, Discord tokens, crypto-wallet recordsdata, and session keys for platforms like Steam and Telegram; victims threat account takeovers, monetary loss, and sextortion-style blackmail.

Faux web site – www[.]barudaquest[.]com (Supply – Acronis)

This exhibits one spoofed obtain portal that even reroutes Android and macOS clicks to the official social recreation Membership Cooee whereas serving Home windows customers a weaponised .exe, illustrating how convincingly the operators mix actual and faux property to widen their attain.

An infection Mechanism: Sandbox Detection and Silent Browsers

Each pattern first verifies that it isn’t executing inside a safety sandbox. Arduous-coded blacklists flag Hyper-V, VirtualBox, and low-RAM hosts; matching any merchandise triggers a fake “recreation error” dialog and terminates the method, a ploy that lets the malware masquerade as a defective beta construct whereas irritating automated evaluation.

The essential logic appears to be like like this:-

const blacklistedGPUs = [
‘VMware SVGA 3D’,
‘VirtualBox Graphics Adapter’
];
exec(‘wmic path win32_VideoController get title’, (err, out) => {
if (blacklistedGPUs.some(gpu => out. Consists of(gpu))) {
showFakeError(); // abort on digital {hardware}
} else {
launchStealer();
}
});

Passing these checks, the malware spawns the sufferer’s personal Chrome-family browser in headless debug mode, pointing it at whereas exposing a remote-debugging port.

By that port the script extracts contemporary cookies and autofill knowledge straight from dwell reminiscence, sidestepping disk-level encryption and locked recordsdata.

Collected artefacts are zipped and uploaded to gofile.io; fallback hosts corresponding to file.io, catbox.moe, and tmpfiles.org guarantee exfiltration even when one service is blocked.

A separate thread forwards the ensuing obtain URL to the attacker’s command-and-control server along with harvested Discord tokens, offering rapid, full-session entry to victims’ chat histories and social graphs.

By fusing polished social-media advertising and marketing with technical methods like VM-aware execution and browser-debug extraction, the marketing campaign demonstrates how fashionable commodity stealers are maturing into multi-layered threats that may outsmart each customers and automatic defenses alike.

Expertise sooner, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Attack, Channels, Computer, Credentials, Discord, Harvest, Leverages, Malware, YouTube

Post navigation

Previous Post: US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam
Next Post: Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter

Related Posts

NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
Microsoft Investigating Forms Service Issue Not Accessible for Users Cyber Security News
Zero Trust Architecture Building Resilient Defenses for 2025 Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News