![]() ![]() Having a stolen user token, attackers gain the ability to control everything that is sent through the Discord client, which means they can potentially gain access to the user’s personal data and contacts, personal messages, confidential information, and so on. ![]() This leads to the fact that when a user connects to the Discord network, the malicious code automatically delivers user data (tokens) to the AnarchyGrabber Stealer authors through a separate channel controlled by cyber criminals. Upon starting an infected Discord client, this modified “index.js” file is also loaded by the client. AnarchyGrabber Stealer modifies the index.js file, which is located in the Discord directory, namely in the “%AppData%\Discord\\modules\discord_desktop_core\” directory. It modifies client files by adding malicious code to them. ![]() The security researchers found that AnarchyGrabber Stealer changes the settings of the Discord client, namely its some JavaScript files, to prevent detection by antivirus software. ![]() AnarchyGrabber Stealer is detected by many anti-virus engines ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |