Here's a new video for you...
Fighting with a RedTiger F9 dashcam and a Carpuride in Mega Breadvan.
https://www.youtube.com/watch?v=6X5HaB10iDY
#redtiger #carpuride #essonne #aixam #aixamfriends #sanspermis #weidcarmastodon
Here's a new video for you...
Fighting with a RedTiger F9 dashcam and a Carpuride in Mega Breadvan.
https://www.youtube.com/watch?v=6X5HaB10iDY
#redtiger #carpuride #essonne #aixam #aixamfriends #sanspermis #weidcarmastodon
Watch out as the new #RedTiger infostealer is targeting gamers on Discord, stealing tokens, payment details, browser credentials and even webcam images.
Read: https://hackread.com/redtiger-malware-discord-tokens-webcam-images/
RedTiger has evolved from a red-team tool to a hacker’s Swiss Army knife—stealing Discord accounts, passwords, and more, all while dodging detection. Could your data be at risk? Find out how this open-source nightmare is unfolding.
Technical alert for SOCs & DFIR teams: RedTiger is a Python‑based infostealer now weaponized in the wild. Key behaviors: PyInstaller binaries, Discord client JS modification (discord_desktop_core index.js), token validation via /users/@me, archive upload to GoFile, webhook delivery via Discord, webcam/screenshot capture, and process/file spamming to obscure forensic traces.
Recommended triage actions:
- Hunt for modifications to discord_desktop_core or unexpected JS files.
- Monitor outbound uploads to GoFile and similar anonymous storage services.
- Alert on unusual Discord webhook creations or metadata and token validation calls to /users/@me.
- Detect mass process spawning or spamming file creation events.
- Enforce secure token storage, hardware MFA, and ephemeral credentials for services.
Discuss your detection queries and signatures — share YARA, Sigma, or hunting queries in comments (safely redacted). Follow our handles for continuous threat updates.
#RedTiger #DFIR #SOC #Hunting #Sigma #YARA #ThreatIntel #Discord #Infostealer #InfoSec #Malware