Thanks in large part to the global pandemic, collaboration platforms like Discord and Slack have taken up intimate positions in our lives, helping maintain personal ties despite physical isolation. But their increasingly integral role has also made them a powerful avenue for delivering malware to unwitting victims—sometimes in unexpected ways.
Cisco’s security division, Talos, published new research on Wednesday highlighting how, over the course of the Covid-19 pandemic, collaboration tools like Slack and, much more commonly, Discord have become handy mechanisms for cybercriminals. With growing frequency, they’re being used to serve up malware to victims in the form of a link that looks trustworthy. In other cases, hackers have integrated Discord into their malware for remote control of their code running on infected machines, and even to steal data from victims. Cisco’s researchers warn that none of the techniques they found actually exploits a clear hackable vulnerability in Slack or Discord, or even requires Slack or Discord to be installed on the victim’s machine. Instead, they simply take advantage of some little-examined features of those collaboration platforms, along with their ubiquity and the trust that both users and systems administrators have come to place in them.
“People are way more likely to do things like click a Discord link than they would have been in the past, because they’re used to seeing their friends and colleagues posting files to Discord and sending them a link,” says Cisco Talos security researcher Nick Biasini. “Everybody’s using collaboration apps, everybody has some familiarity with them, and bad guys have noticed that they can abuse them.”
Among the collaboration app exploitation techniques Cisco’s researchers are warning about, the most common uses the platforms essentially as a file hosting service. Both Discord and Slack allow users to upload files to their servers and create externally accessible links to those files, so that anyone can click on the link and access the file. In many cases, Cisco found, those files are malicious; the researchers list nine recent remote-access spy tools that hackers have tried to install in this fashion, including Agent Tesla, LimeRAT, and Phoenix Keylogger.
The links don’t have to be delivered to victims inside of Slack or Discord. They can also be served up over email, where hackers can far more easily trawl for victims en masse, impersonate a victim’s colleagues, and reach users with whom they have no previous connection. As a result, Cisco has recorded a major uptick in the use of those links to deliver malware via email in the past year. “Over the last several months we’ve seen tens of thousands, and the rate has been steadily increasing,” says Biasini. “Right now it appears to be peaking.”
Security firm Zscaler similarly noted the rise in the technique’s use by cybercriminals in research published in February, warning that they’d spotted as many as two dozen malware variants per day, including ransomware and cryptocurrency mining programs, being delivered as fake video games embedded in Discord links. Hackers have also used the technique to plant malware that steals Discord authentication tokens from victims’ computers, allowing the hacker to impersonate them on Discord, spreading more malicious Discord links while using a victim’s account to cover their tracks.