Netskope est à nouveau reconnu comme leader dans le Magic Quadrant de Gartner®™ pour les plates-formes SASE. Obtenir le rapport

fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
Essayez Netskope
Mettez la main à la pâte avec la plateforme Netskope
C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
Netskope est reconnu comme le leader le plus avancé dans sa vision pour les plateformes SSE et SASE.
2X est un leader dans le Magic Quadrant de Gartner® pour les plateformes SASE
Une plateforme unifiée conçue pour votre parcours
Sécuriser l’IA générative pour les nuls
Sécuriser l’IA générative pour les nuls
Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
Prévention des pertes de données (DLP) pour les Nuls eBook
La prévention moderne des pertes de données (DLP) pour les Nuls
Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
Réseau SD-WAN moderne avec SASE pour les nuls
SD-WAN moderne pour les nuls en SASE
Cessez de rattraper votre retard en matière d'architecture de réseau
Identification des risques
Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
Support technique de Netskope
Support technique de Netskope
Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
Vidéo Netskope
Formation Netskope
Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

RedTiger: New Red Teaming Tool in the Wild Targeting Gamers and Discord Accounts

Oct 23 2025

Summary

Gamers are a hot target for infostealers these days. This blog post is the second we have published this month about an infostealer targeting gamers, with the previous one describing a Python-based malware targeting Discord. This blog post focuses on RedTiger, a red-teaming tool from which we have seen multiple payloads circulating in the wild.

Released to the public in 2024, RedTiger is a relatively new, open-source, Python-based read teaming tool that bundles various security and penetration testing tools, including network scanning, open source intelligence (OSINT) tools, phishing-related toolkits, an infostealer, and Discord-related tools. As is often the case with red-team tools, attackers usually adopt them and use them for malicious purposes. For example, the very popular C2 framework Cobalt Strike has long been cracked and abused by attackers who like its highly customizable feature set. While RedTiger offers multiple separate tools, this post will focus exclusively on the infostealer.

The RedTiger infostealer targets various types of sensitive information, with a primary focus on Discord accounts. It injects custom JavaScript into the Discord client to intercept events. Additionally, it collects browser-stored data (including payment information), game-related files, cryptocurrency wallet data, and screenshots from the host system. It can also spy through the victim’s webcam and overload storage devices by mass-spawning processes and creating files. It also provides various defense evasion techniques and persistence mechanisms. Based on sample filenames and some custom messages, attackers are targeting gamers, with certain samples indicating a possible focus on French-speaking users.

Key Findings

  • RedTiger infostealer is a new, open-source red teaming tool, with payloads now appearing in the wild and more variants expected.
  • Its exfiltration occurs in two stages: Archived stolen files are first uploaded to GoFile cloud storage, then the download link is sent to the attacker via a Discord webhook.
  • Based on filenames and display messages, the attackers are targeting gamers, with some samples targeting French-speaking users.

RedTiger infostealer in the wild

All RedTiger infostealer samples observed in the wild were distributed as binaries compiled with PyInstaller. The samples’ filenames suggest a primary focus on gaming users, and several samples include warning messages in French, indicating that some samples are targeting French-speaking victims.

The RedTiger infostealer is modular, so the various samples use different features and target multiple types of data. In the samples analyzed, the malware focused on Discord data, browser-stored credentials and payment information, cryptocurrency wallets, and game accounts like Roblox.

Let’s take a closer look at how RedTiger Stealer operates.

Persistence

The persistence mechanism is available on Windows, Linux, and Darwin (macOS) systems, but must be enabled as an attacker builds the RedTiger infostealer. On Windows, it adds the payload to the startup folder to run at login. Persistence on Linux and Darwin is incomplete. On Linux, it copies the Python script to the autostart folder, but still needs a .desktop file to execute it. On Darwin, it copies the script to the LaunchAgents folder, but a .plist config file is required to run it at login. Neither file is included in the script.

Exfiltration

The RedTiger infostealer exfiltrates data in two stages. First, it archives all stolen data from the victim and uploads it to GoFile cloud storage. GoFile allows users to upload files without an account, enabling easy and anonymous use of cloud storage. After uploading, a download link is generated and sent to the attacker through Discord via a webhook. Additionally, it also sends victim details such as IP address, country, and hostname to identify the source of the stolen data.

File and process spamming


Another feature of this infostealer is mass file and process spamming, which can overload system resources and hinder forensic analysis by flooding the timeline with meaningless artifacts.

The infostealer creates 100 files with random file extensions from a predefined list. It writes random alphanumeric strings into each file, resulting in unpredictable file sizes. It spawns a new thread for each file creation and waits for all threads to complete, ensuring the process is fully carried out. 

For process spamming, the infostealer launches 100 threads. Each thread executes a loop that launches one instance of every program on the predefined list, resulting in 400 total processes being launched simultaneously across the system. 

Defense evasion features

The infostealer’s defense evasion features terminate its process if it detects usernames, hostnames, or hardware IDs from a predefined list typically associated with sandbox environments.

Username
WDAGUtilityAccountAbbyhmarcpatexRDhJ0CNFevzXkEecfMwgjFrank
8Nl0ColNQ5bqLisaJohngeorgeBrunoPxmdUOpVyx8VizSM
w0fjuOVmCcP5AlmVwjj9bPqONjHVwexsS3u2v9m8JuliaHEUeRzlfred
serverBvJChRPnsxnHarry JohnsonSqgFOf3GLucasmikePateX
h7dk1xPrLouiseUser01testRGzcBUyrznRegstephpie
Hostnames
0CC47AC83802BEE7370C-8C0C-4DESKTOP-ET51AJO965543DESKTOP-NAKFFMTWIN-5E07COS9ALRB30F0242-1C6A-4DESKTOP-VRSQLAG
Q9IATRKPRHXC64ZBDESKTOP-D019GDMDESKTOP-WI8CLETSERVER1LISA-PCJOHN-PCDESKTOP-B0T93D6
DESKTOP-1PYKP29DESKTOP-1Y2433R’WILEYPCWORK6C4E733F-C2D9-4RALPHS-PCDESKTOP-WG3MYJSDESKTOP-7XC6GEZ
DESKTOP-5OV9S0OQarZhrdBpjORELEEPCARCHIBALDPCJULIA-PCd1bnJkfVlHNETTYPCDESKTOP-BUGIO
DESKTOP-CBGPFEE’SERVER-PCTIQIYLA9TW5MDESKTOP-KALVINOCOMPNAME_4047DESKTOP-19OLLTDDESKTOP-DE369SEEA8C2E2A-D017-4
AIDANPCLUCAS-PCMARCI-PCACEPCMIKE-PCDESKTOP-IAPKN1PDESKTOP-NTU7VUOLOUISE-PC
T00917test42test
Hardware IDs
671BC5F7-4B0F-FF43-B923-8B1645581DC8
7AB5C494-39F5-4941-9163-47F54D6D5016
03DE0294-0480-05DE-1A06-350700080009
11111111-2222-3333-4444-555555555555
6F3CA5EC-BEC9-4A4D-8274-11168F640058
ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548
4C4C4544-0050-3710-8058-CAC04F59344A
00000000-0000-0000-0000-AC1F6BD04972
00000000-0000-0000-0000-000000000000
5BD24D56-789F-8468-7CDC-CAA7222CC121
49434D53-0200-9065-2500-65902500E439
49434D53-0200-9036-2500-36902500F022
777D84B3-88D1-451C-93E4-D235177420A7
49434D53-0200-9036-2500-369025000C65
B1112042-52E8-E25B-3655-6A4F54155DBF
00000000-0000-0000-0000-AC1F6BD048FE
EB16924B-FB6D-4FA1-8666-17B91F62FB37
A15A930C-8251-9645-AF63-E45AD728C20C
67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3
C7D23342-A5D4-68A1-59AC-CF40F735B363
63203342-0EB0-AA1A-4DF5-3FB37DBB0670
44B94D56-65AB-DC02-86A0-98143A7423BF
6608003F-ECE4-494E-B07E-1C4615D1D93C
D9142042-8F51-5EFF-D5F8-EE9AE3D1602A
49434D53-0200-9036-2500-369025003AF0
8B4E8278-525C-7343-B825-280AEBCD3BCB
4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27
79AF5279-16CF-4094-9758-F88A616D81B4
FF577B79-782E-0A4D-8568-B35A9B7EB76B
08C1E400-3C56-11EA-8000-3CECEF43FEDE
6ECEAF72-3548-476C-BD8D-73134A9182C8
49434D53-0200-9036-2500-369025003865
119602E8-92F9-BD4B-8979-DA682276D385
12204D56-28C0-AB03-51B7-44A8B7525250
63FA3342-31C7-4E8E-8089-DAFF6CE5E967
365B4000-3B25-11EA-8000-3CECEF44010C
D8C30328-1B06-4611-8E3C-E433F4F9794E
00000000-0000-0000-0000-50E5493391EF
00000000-0000-0000-0000-AC1F6BD04D98
4CB82042-BA8F-1748-C941-363C391CA7F3
B6464A2B-92C7-4B95-A2D0-E5410081B812
BB233342-2E01-718F-D4A1-E7F69D026428
9921DE3A-5C1A-DF11-9078-563412000026
CC5B3F62-2A04-4D2E-A46C-AA41B7050712
00000000-0000-0000-0000-AC1F6BD04986
C249957A-AA08-4B21-933F-9271BEC63C85
BE784D56-81F5-2C8D-9D4B-5AB56F05D86E
ACA69200-3C4C-11EA-8000-3CECEF4401AA
3F284CA4-8BDF-489B-A273-41B44D668F6D
BB64E044-87BA-C847-BC0A-C797D1A16A50
2E6FB594-9D55-4424-8E74-CE25A25E36B0
42A82042-3F13-512F-5E3D-6BF4FFFD8518
38AB3342-66B0-7175-0B23-F390B3728B78
48941AE9-D52F-11DF-BBDA-503734826431
032E02B4-0499-05C3-0806-3C0700080009
DD9C3342-FB80-9A31-EB04-5794E5AE2B4C
E08DE9AA-C704-4261-B32D-57B2A3993518
07E42E42-F43D-3E1C-1C6B-9C7AC120F3B9
88DC3342-12E6-7D62-B0AE-C80E578E7B07
5E3E7FE0-2636-4CB7-84F5-8D2650FFEC0E
96BB3342-6335-0FA8-BA29-E1BA5D8FEFBE
0934E336-72E4-4E6A-B3E5-383BD8E938C3
12EE3342-87A2-32DE-A390-4C2DA4D512E9
38813342-D7D0-DFC8-C56F-7FC9DFE5C972
8DA62042-8B59-B4E3-D232-38B29A10964A
3A9F3342-D1F2-DF37-68AE-C10F60BFB462
F5744000-3C78-11EA-8000-3CECEF43FEFE
FA8C2042-205D-13B0-FCB5-C5CC55577A35
C6B32042-4EC3-6FDF-C725-6F63914DA7C7
FCE23342-91F1-EAFC-BA97-5AAE4509E173
CF1BE00F-4AAF-455E-8DCD-B5B09B6BFA8F
050C3342-FADD-AEDF-EF24-C6454E1A73C9
4DC32042-E601-F329-21C1-03F27564FD6C
DEAEB8CE-A573-9F48-BD40-62ED6C223F20
05790C00-3B21-11EA-8000-3CECEF4400D0
5EBD2E42-1DB8-78A6-0EC3-031B661D5C57
9C6D1742-046D-BC94-ED09-C36F70CC9A91
907A2A79-7116-4CB6-9FA5-E5A58C4587CD
A9C83342-4800-0578-1EE8-BA26D2A678D2
D7382042-00A0-A6F0-1E51-FD1BBF06CD71
1D4D3342-D6C4-710C-98A3-9CC6571234D5
CE352E42-9339-8484-293A-BD50CDC639A5
60C83342-0A97-928D-7316-5F1080A78E72
02AD9898-FA37-11EB-AC55-1D0C0A67EA8A
DBCC3514-FA57-477D-9D1F-1CAF4CC92D0F
FED63342-E0D6-C669-D53F-253D696D74DA
2DD1B176-C043-49A4-830F-C623FFB88F3C
4729AEB0-FC07-11E3-9673-CE39E79C8A00
84FE3342-6C67-5FC6-5639-9B3CA3D775A1
DBC22E42-59F7-1329-D9F2-E78A2EE5BD0D
CEFC836C-8CB1-45A6-ADD7-209085EE2A57
A7721742-BE24-8A1C-B859-D7F8251A83D3
3F3C58D1-B4F2-4019-B2A2-2A500E96AF2E
D2DC3342-396C-6737-A8F6-0C6673C1DE08
EADD1742-4807-00A0-F92E-CCD933E9D8C1
AF1B2042-4B90-0000-A4E4-632A1C8C7EB1
FE455D1A-BE27-4BA4-96C8-967A6D3A9661
921E2042-70D3-F9F1-8CBD-B398A21F89C6
Process names
cheatengineCheat enginex32dbg’x64dbgollydbgwindbgida
ida64ghidraradare2radaredbgimmunitydbgdnspy
softiceedbdebuggerVisual studio debuggerlldbgdbvalgrind
hex-raysdisassemblertracerdebugviewprocdumpstraceltrace
drmemorydecompilerhopperBinary ninjabochsvdbfrida
Api monitorProcess hackersysinternalsprocexpProcess explorerMonitor toolvmmap
xperfperfviewpy-spystrace-log

Additionally, the infostealer modifies the hosts file to redirect DNS requests for specific security vendor domains to localhost, effectively blocking access to those vendors.

Data targeted by RedTiger

The sections below describe the data targeted by RedTiger and the techniques used to collect them.

Sensitive Discord information, through app modification

Among the information that RedTiger targets is Discord account and payment information. It starts by defining two regular expressions to capture both plain and encrypted Discord tokens. It will then locate the database files (*.log and *ldb) of Discord or browser applications, terminate the process, and then search for the Discord token using the regular expressions.

Once it collects the Discord token, it will run a function used to validate the token. It does so by sending a GET request to the Discord API endpoint /users/@me, which returns True if the Discord API returns 200 HTTP status.

Once the Discord tokens are validated, it will send another GET request to the same API endpoint, and collect several details including username, global displayname, user ID, email and verification status and MFA setting, and subscription level.

The RedTiger infostealer then proceeds to siphon the victim’s banking information saved in Discord. This includes bank payment information, PayPal account, and promotion codes. It does so by sending a GET request to Discord’s API endpoint using the stolen token.

Lastly, the infostealer injects a custom JavaScript into Discord’s client index.js file (discord_desktop_core) to monitor and intercept Discord traffic. It intercepts API calls to Discord, Braintree, and Stripe and inspects the data sent for event-specific keywords to selectively capture traffic. It monitors several activities, including payment information modification, purchases, login activities (including MFA), and downloading billing information.

Notably, one of the events monitored is changing the victim’s email address and password. This means that even if the victim changes their password, the infostealer will still grab the new credentials, along with the new Discord tokens.

The table below summarizes the endpoint and event that the infostealer is targeting.

API EndpointEvent/Action
/auth/loginUser logging in (captures username/email & password)
/users/@me (GET/PATCH)Fetching or updating user profile (captures token, email change, password change, MFA, etc.)
/users/@me PATCHChanging user details (password/email change, profile updates)
/billing/payment-sources (Stripe API)Adding or modifying billing/payment sources (captures card/PayPal details)
/store/skus/*/purchase (Stripe API)Purchasing Discord Nitro or other store items (captures Nitro gift codes, payment info)
/tokens (Stripe API)Adding a new credit card

Sensitive files

Another target of the RedTiger infostealer is a set of files in user profile directories that have filenames matching predefined keywords. It scans for files ending in .txt, .sql, or .zip. If the filename exactly matches one of the configured keywords, the file is added to a ZIP archive under the internal path Interesting Files with a randomized suffix to avoid name collisions.

Game and crypto wallet data

The RedTiger infostealer targets cryptocurrency wallets and game-related applications. It attempts to terminate associated processes to release locked files, copies the specified directories and files from a predefined list, records the original path in a path.txt file, and stores all collected data inside the archive under Session Files/<AppName>/Files/.

In addition to targeting other game-related applications, the infostealer has a separate function to steal Roblox account information stored in the browser. It uses the Python browser_cookie3 module to extract cookies for the “roblox.com” domain, then extracts info for GET requests to the “/mobileapi/userinfo” API endpoint to parse the data of interest.

Browser data and credit card information

Similar to the Python NodeStealer previously reported, RedTiger also targets information saved in the browser, including passwords, cookies, download and browsing history, credit card information, and extensions.

The RedTiger infostealer targets a wide range of browsers, including major browsers and some of their release channels. The distinction was made because the folder paths of release channels are different.

Targeted browsers
Google ChromeGoogle Chrome BetaGoogle Chrome DevGoogle Chrome CanaryGoogle Chrome UnstableOpera
Opera GXOpera NeonBraveVivaldiInternet ExplorerAmigo
TorchKometaOrbitumCent Browser7StarSputnik
Epic Privacy BrowserUranYandexYandex CanaryYandex DeveloperYandex Beta
Yandex TechYandex SxSIridumMozilla FirefoxSafariMicrosoft Edge

Webcam and screen capture

The RedTiger infostealer can capture both a webcam snapshot and a screenshot of the victim’s primary desktop screen. It uses the cv2 (OpenCV) module to access the default webcam, capture a single image, convert it from BGR to RGB, and release the camera so it will be available for use by other applications. For screenshots, it uses the Pillow (PIL) module’s ImageGrab().grab function to capture the desktop, compress the image, and save it as “Screenshot.png” directly into the ZIP archive, using the same in-memory buffer as the webcam image.

Netskope Detection

  • Netskope Threat Protection
    • Win64.Trojan.RedTiger
  • Netskope Advanced Threat Protection provides proactive coverage against this threat.
    • Gen.Detect.By.NSCloudSandbox.tr

Conclusions

The new, open-source RedTiger infostealer has recently emerged in the wild, primarily targeting victims’ Discord accounts, Roblox credentials, browser data (including cookies, passwords, and browsing history), and cryptocurrency wallet files. By uploading stolen data to GoFile cloud storage and sending download links via Discord webhook, RedTiger enables attackers to efficiently exfiltrate sensitive information while evading detection. Netskope Threat Labs will continue to monitor information stealers, including any developments related to the RedTiger infostealer. 

IOCs

All the IOCs and scripts related to this malware can be found in our GitHub repository.

author image
Jan Michael Alcantara
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
Connectez-vous avec Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.