Researchers found out a uncomplicated malware builder designed to steal credentials, then pinging them to Discord webhooks.
On April 23rd, 2022, a Discord consumer with the deal with “Portu” began advertising a new password-stealing malware builder.
Malware builders are plans which so-referred to as script kiddie hackers can craft their have executables on major of. Script kiddie is cybersecurity parlance for a amateur hacker who makes use of a preexisting code to a little modify it for their own nefarious purposes.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Four times later on, threat analysts from Uptycs uncovered the initial sample of a Portu-influenced malware sample in the wild researchers dubbed “KurayStealer.” According to scientists, the malware has been used to goal Discord consumers.
How KurayStealer Is effective
The author behind KurayStealer has clearly taken inspiration – and code – from those other attacks. “We have witnessed several other related versions floating close to in public repositories like github,” the researchers noted, concluding that “the KurayStelaer builder has quite a few factors of unique password stealers.”
When it’s 1st executed, KurayStealer runs a verify to establish if the destructive user is functioning the absolutely free or “VIP” (paid out) model.
Subsequent, it attempts to swap the string “api/webhooks” with “Kisses” in BetterDiscord – an prolonged edition of the Discord app, with larger features for developers. If this action is thriving, the hacker can undermine the application in order to established up webhooks.
Webhooks are a mechanism by which webpages and apps can send out true-time info to one particular another above HTTP. They are like APIs, the important variation becoming that webhooks mail information and facts automatically, without the have to have for a request from the receiver.
With webhooks in location, the software usually takes a screenshot and grabs the geo-area of the target machine. Then it commences credential hunting: probing for passwords, tokens, IP addresses and extra from Discord, Microsoft Edge, Chrome, and 18 other apps. Any data scoured in this process funnels back again to the attacker through the webhooks.
What We Know of the Writer
Script kiddies are almost never subtle.
Within KurayStealer’s code is a reference to who wrote it: “Suleymansha & Portu,” and an invite to a Discord channel run by the user “Portu#0022.” Portu#0022’s profile has a connection to their profile on Shoppy – an ecommerce platform – with samples of other malicious programs. It also points to their YouTube channel, which used to have a video up that demonstrated how to use KurayStealer. The channel is barren now, but for a cartoon profile image and an indication that Portu is from Spain.
On April 26th, Portu announced they ended up functioning on a new ransomware software. “Based on the announcement and the observations,” the scientists concluded, “we feel that the authors may arrive up with more recent versions of password stealers and other malware.”
“Our investigate on KurayStealer backed with OSINT highlights the rise in prevalence of password stealers making use of Discord tokens as a C2 for harvesting the victims’ qualifications. Enterprises must have restricted security controls and multi-layered visibility and security methods to determine and detect this kind of attacks.”
Some sections of this report are sourced from:
threatpost.com