Connect with us

News

Hackers Turn RedTiger Into Data-Stealing Malware Targeting Discord Users

Published

on

A powerful open-source security tool built for ethical hacking is now being exploited by cybercriminals. Attackers are using RedTiger, a Python-based red-team toolkit, to build an info-stealing malware that targets Discord users and payment data, raising new alarms about the dark side of open-source software.

RedTiger Misused as a Weapon Against Discord Users

RedTiger, originally designed for penetration testing on Windows and Linux, has recently become a favorite among threat actors. The tool includes modules for network scanning, password cracking, open-source intelligence (OSINT) collection, and Discord utilities. However, its malware builder feature has made it easy for attackers to craft info-stealing programs with minimal effort.

According to new findings from cybersecurity firm Netskope, criminals have repurposed RedTiger’s info-stealer component to harvest sensitive data from Discord users, particularly targeting French-speaking communities.

The malicious RedTiger variant collects Discord tokens, payment details, and multi-factor authentication data, posing a serious threat to both personal and financial security.

Hackers are exploiting RedTiger

How the Malware Works

Once compiled into standalone executables using PyInstaller, attackers disguise the files under appealing names linked to gaming or Discord tools. When executed, the malware begins scanning the infected computer for local database files and browser data.

It uses regular expressions (regex) to extract Discord tokens and validate them before retrieving the victim’s account details such as email, subscription plans, and authentication status. The malware then injects custom JavaScript into Discord’s core files, particularly the index.js script, allowing it to intercept every API call and capture real-time events.

Among the most alarming aspects of the attack is its ability to extract saved payment data including PayPal and credit card information from Discord’s local storage.

Expanding Beyond Discord to Broader Data Theft

RedTiger’s weaponized variant doesn’t stop at Discord. It also harvests:

  • Saved browser passwords, cookies, and history

  • Cryptocurrency wallet files

  • Game account data, including Roblox and Steam

  • Sensitive local files with extensions like .TXT, .SQL, and .ZIP

Additionally, it takes screenshots and webcam snapshots, giving attackers a visual glimpse into the victim’s environment.

Below is a summary of what RedTiger targets:

Data TypeDescription
DiscordTokens, MFA info, payment details
BrowsersPasswords, cookies, credit cards
Crypto WalletsPrivate keys and wallet files
GamesRoblox and other gaming accounts
FilesystemText, SQL, and ZIP files

Once all information is gathered, RedTiger compresses the data and uploads it to GoFile, a cloud service that allows anonymous file sharing. The attacker then receives the link through a Discord webhook, along with the victim’s system metadata.

Evasion Tactics That Complicate Detection

RedTiger’s modified malware exhibits advanced evasion techniques. It terminates itself when it detects debugging tools or sandbox environments, commonly used by security researchers to analyze malicious software.

To further evade detection, it spawns hundreds of fake processes and creates random files to overwhelm forensic analysis systems. This behavior makes it harder for analysts and automated tools to identify the core malicious actions within the system.

One cybersecurity researcher described it as “a nightmare for sandbox environments,” since its process-spawning technique effectively floods monitoring tools.

How Attackers Spread RedTiger Malware

Although Netskope has not confirmed exact infection channels, common distribution routes have emerged. These include:

  • Discord servers and community channels

  • YouTube videos promising free game tools or cheats

  • Malicious software download sites

  • Online forums promoting “boosters” or “mods”

  • Malvertising campaigns on gaming platforms

This trend highlights the continued risk of social engineering, where attackers lure users with attractive downloads that secretly carry malware payloads.

What Users Can Do to Stay Safe

If you suspect that your system might be infected with a RedTiger-based malware, take these immediate actions:

  1. Revoke your Discord tokens from the Discord settings menu.

  2. Change your passwords on all linked accounts.

  3. Reinstall the Discord client directly from its official website.

  4. Clear your browser data, including saved passwords and cookies.

  5. Enable multi-factor authentication (MFA) on all critical accounts.

Users should never download executables or “tools” from unverified sources, especially ones that claim to enhance games or Discord performance.

Cybersecurity experts recommend sticking to trusted download platforms and ensuring antivirus software is updated. RedTiger’s misuse is another reminder of how open-source projects, though created for good, can be turned into powerful weapons in the wrong hands.

As the open-source security landscape evolves, ethical developers are now being urged to implement safeguards or licensing checks that limit dangerous misuse of their tools.

The rise of RedTiger as a cyber threat underlines a growing challenge for the security community — balancing transparency and freedom of open-source projects with responsible controls against abuse.

In a world where attackers can weaponize legitimate tools within hours, awareness and caution remain the first lines of defense.

Hayden Patrick is a writer who specializes in entertainment and sports. He is passionate about movies, music, games, and sports, and he shares his opinions and reviews on these topics. He also writes on other topics when there is no one available, such as health, education, business, and more.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING