ClickFix Attack: Expired Discord Invites Now Deliver Remote Access Trojans

by | Jun 16, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Hackers Exploit Discord Invite Flaw to Deliver Malware via Hijacked Links

A new cyberattack campaign is weaponizing expired and deleted Discord invite links to redirect unsuspecting users to malicious servers that distribute remote access trojans (RATs) and info-stealing malware. Security firm Check Point reports that over 1,300 users across the US, UK, France, the Netherlands, and Germany have already been affected.

Discord’s Vanity Link Loophole Exposed

At the center of the attack is a flaw in Discord’s invitation system—specifically, how the platform handles custom (vanity) invite codes for Level 3 servers. When these servers lose their boost status, their custom invite codes become available again, allowing other users to reclaim and reuse them for malicious purposes.

Incredibly, the same flaw applies to expired temporary invites and deleted permanent links, which hackers can now “revive” and use for new servers, exploiting users’ trust in familiar links.

“Surprisingly, the mechanism for creating custom invite links lets you reuse expired temporary codes and, in some cases, deleted permanent ones,” said Check Point.

Additionally, Discord’s case-insensitive handling of vanity links allows attackers to register duplicate invite codes using lowercase variations of uppercase invites—even if the original is still valid.

Example invite (top) and hijacking it in a new channel (bottom)Hijacking a temporary invite code (top) and reusing it in a vanity link (bottom)
Source: Check Point

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Weaponized Invites Lead to Fake Verification Traps

Once hijacked, the invite links redirect victims to fake servers that appear legitimate. These servers typically contain only one visible channel: #verify. Here, an automated bot prompts users to complete a “verification” process.

Attacker's Discord channelAttacker’s Discord channel
Source: Check Point

Victims are tricked into copying and executing a malicious PowerShell command via the Windows Run dialog. The attack—dubbed ClickFix—mimics Discord’s interface and falsely claims that a CAPTCHA failed to load.

The ClickFix pageThe ClickFix page
Source: Check Point

The end goal: tricking users into launching a multi-stage malware infection chain without realizing it.

Multi-Stage Malware Payloads Delivered via Bitbucket

The malicious script initiates a complex infection chain:

  • PowerShell downloaders fetch further stages
  • Obfuscated C++ loaders and VBScript files execute malicious payloads
  • Final payloads are hosted on Bitbucket, a legitimate code hosting platform

The deployed malware includes:

  • AsyncRAT (AClient.exe)
    • Remote access trojan with keylogging, webcam/microphone access, and dynamic C2 retrieval via Pastebin
  • Skuld Stealer (skul.exe)
    • Info-stealer targeting browser credentials, cookies, Discord tokens, and crypto wallets via injected JavaScript
  • ChromeKatz (cks.exe)
    • Custom data-stealer built from the open-source ChromeKatz project, focused on browser data theft

The attack also creates a scheduled task to re-execute the malware every five minutes, ensuring persistence.

Infection chain from ClickFix to malwareInfection chain from ClickFix to malware
Source: Check Point




Countries Targeted and Protective Measures

The campaign has impacted users primarily in the US, UK, France, the Netherlands, and Germany, according to download telemetry data from Check Point.

Recommended defenses include:

  • Avoid clicking old Discord invite links, especially from outdated posts.
  • Never run PowerShell or other command-line code from unverified sources.
  • Treat any verification process—particularly those that redirect you outside Discord—with high suspicion.
  • For server admins, use permanent invite links to reduce the risk of link hijacking.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This