RedTiger Infostealer Targets Discord Users via Fake Game Mods

Oct 27, 2025

Summary

Attribute

Details

Attack Type

Infostealer (RedTiger-based)

Target

Discord users (primarily in France)

Impact

Theft of authentication tokens, browser data, and crypto wallets

Attack Vector

Malicious game mods, Discord utilities, and executables

Data Exfiltration

Uploaded to GoFile via Discord webhooks

Detection Evasion

Anti-sandboxing, dummy process spawning

Recommended Action

Revoke tokens, reinstall Discord, scan for malware

Incident Overview

Hackers have weaponized the open-source RedTiger penetration testing tool into a potent infostealer that targets Discord users. The malware masquerades as game mods or Discord utilities and spreads through unverified download sites and Discord servers.

Once installed, the malicious binary scans systems for Discord tokens, browser credentials, and cryptocurrency wallets. It injects code into Discord’s core files to intercept user actions and exfiltrates stolen data to anonymous cloud services like GoFile, sending the link to attackers via Discord webhooks.

Technical Breakdown

  • Distribution: Fake game mods, cheats, and “boost” tools shared via Discord or forums.

  • Data Stolen: Discord tokens, passwords, browser cookies, crypto wallets, game accounts.

  • Evasion: RedTiger’s modified build spawns multiple fake processes to evade analysis.

  • Command & Control: Exfiltrated data sent through webhooks and cloud file-sharing links.

These attacks bypass traditional password protection — once a Discord token is stolen, it can grant full account access, even with MFA enabled.

Recommended Actions

For Users:

  • Revoke all Discord sessions and reset passwords immediately.

  • Reinstall Discord from official sources.

  • Clear browser-saved passwords and cookies.

  • Run a full malware scan.

  • Avoid downloading “mods” or “tools” from unofficial sources.

For Organizations:

  • Monitor outbound traffic to GoFile and other anonymized upload domains.

  • Deploy endpoint detection rules to flag unusual process creation.

  • Include “free tool traps” in cybersecurity awareness simulations.

ClearPhish Insight

The RedTiger Discord campaign highlights how legitimate tools can be turned into attack weapons through human trust exploitation.
At ClearPhish, we simulate similar “Free Tool Trap” scenarios in our awareness programs—demonstrating how a single careless download can lead to a full-scale compromise.

By blending cinematic storytelling and micro-simulations, organizations can train users to pause before downloading anything that looks “helpful” but comes from unverified sources.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Jan 22, 2026

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Jan 19, 2026

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.