Événement de lancement : Smart AI Security. Contrôle total des données. Réservez votre place

fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
          Essayez Netskope
          Mettez la main à la pâte avec la plateforme Netskope
          C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
            Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
            Netskope est reconnu comme le leader le plus avancé dans sa vision pour les plateformes SSE et SASE.
            2X est un leader dans le Magic Quadrant de Gartner® pour les plateformes SASE
            Une plateforme unifiée conçue pour votre parcours
              Sécuriser l’IA générative pour les nuls
              Sécuriser l’IA générative pour les nuls
              Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
                Prévention des pertes de données (DLP) pour les Nuls eBook
                La prévention moderne des pertes de données (DLP) pour les Nuls
                Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
                  Réseau SD-WAN moderne avec SASE pour les nuls
                  SD-WAN moderne pour les nuls en SASE
                  Cessez de rattraper votre retard en matière d'architecture de réseau
                    Identification des risques
                    Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
                        Support technique de Netskope
                        Support technique de Netskope
                        Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
                          Vidéo Netskope
                          Formation Netskope
                          Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

                            RedTiger: New Red Teaming Tool in the Wild Targeting Gamers and Discord Accounts

                            Oct 23 2025

                            Summary

                            Gamers are a hot target for infostealers these days. This blog post is the second we have published this month about an infostealer targeting gamers, with the previous one describing a Python-based malware targeting Discord. This blog post focuses on RedTiger, a red-teaming tool from which we have seen multiple payloads circulating in the wild.

                            Released to the public in 2024, RedTiger is a relatively new, open-source, Python-based read teaming tool that bundles various security and penetration testing tools, including network scanning, open source intelligence (OSINT) tools, phishing-related toolkits, an infostealer, and Discord-related tools. As is often the case with red-team tools, attackers usually adopt them and use them for malicious purposes. For example, the very popular C2 framework Cobalt Strike has long been cracked and abused by attackers who like its highly customizable feature set. While RedTiger offers multiple separate tools, this post will focus exclusively on the infostealer.

                            The RedTiger infostealer targets various types of sensitive information, with a primary focus on Discord accounts. It injects custom JavaScript into the Discord client to intercept events. Additionally, it collects browser-stored data (including payment information), game-related files, cryptocurrency wallet data, and screenshots from the host system. It can also spy through the victim’s webcam and overload storage devices by mass-spawning processes and creating files. It also provides various defense evasion techniques and persistence mechanisms. Based on sample filenames and some custom messages, attackers are targeting gamers, with certain samples indicating a possible focus on French-speaking users.

                            Key Findings

                            • RedTiger infostealer is a new, open-source red teaming tool, with payloads now appearing in the wild and more variants expected.
                            • Its exfiltration occurs in two stages: Archived stolen files are first uploaded to GoFile cloud storage, then the download link is sent to the attacker via a Discord webhook.
                            • Based on filenames and display messages, the attackers are targeting gamers, with some samples targeting French-speaking users.

                            RedTiger infostealer in the wild

                            All RedTiger infostealer samples observed in the wild were distributed as binaries compiled with PyInstaller. The samples’ filenames suggest a primary focus on gaming users, and several samples include warning messages in French, indicating that some samples are targeting French-speaking victims.

                            The RedTiger infostealer is modular, so the various samples use different features and target multiple types of data. In the samples analyzed, the malware focused on Discord data, browser-stored credentials and payment information, cryptocurrency wallets, and game accounts like Roblox.

                            Let’s take a closer look at how RedTiger Stealer operates.

                            Persistence

                            The persistence mechanism is available on Windows, Linux, and Darwin (macOS) systems, but must be enabled as an attacker builds the RedTiger infostealer. On Windows, it adds the payload to the startup folder to run at login. Persistence on Linux and Darwin is incomplete. On Linux, it copies the Python script to the autostart folder, but still needs a .desktop file to execute it. On Darwin, it copies the script to the LaunchAgents folder, but a .plist config file is required to run it at login. Neither file is included in the script.

                            Exfiltration

                            The RedTiger infostealer exfiltrates data in two stages. First, it archives all stolen data from the victim and uploads it to GoFile cloud storage. GoFile allows users to upload files without an account, enabling easy and anonymous use of cloud storage. After uploading, a download link is generated and sent to the attacker through Discord via a webhook. Additionally, it also sends victim details such as IP address, country, and hostname to identify the source of the stolen data.

                            File and process spamming


                            Another feature of this infostealer is mass file and process spamming, which can overload system resources and hinder forensic analysis by flooding the timeline with meaningless artifacts.

                            The infostealer creates 100 files with random file extensions from a predefined list. It writes random alphanumeric strings into each file, resulting in unpredictable file sizes. It spawns a new thread for each file creation and waits for all threads to complete, ensuring the process is fully carried out. 

                            For process spamming, the infostealer launches 100 threads. Each thread executes a loop that launches one instance of every program on the predefined list, resulting in 400 total processes being launched simultaneously across the system. 

                            Defense evasion features

                            The infostealer’s defense evasion features terminate its process if it detects usernames, hostnames, or hardware IDs from a predefined list typically associated with sandbox environments.

                            Username
                            WDAGUtilityAccountAbbyhmarcpatexRDhJ0CNFevzXkEecfMwgjFrank
                            8Nl0ColNQ5bqLisaJohngeorgeBrunoPxmdUOpVyx8VizSM
                            w0fjuOVmCcP5AlmVwjj9bPqONjHVwexsS3u2v9m8JuliaHEUeRzlfred
                            serverBvJChRPnsxnHarry JohnsonSqgFOf3GLucasmikePateX
                            h7dk1xPrLouiseUser01testRGzcBUyrznRegstephpie
                            Hostnames
                            0CC47AC83802BEE7370C-8C0C-4DESKTOP-ET51AJO965543DESKTOP-NAKFFMTWIN-5E07COS9ALRB30F0242-1C6A-4DESKTOP-VRSQLAG
                            Q9IATRKPRHXC64ZBDESKTOP-D019GDMDESKTOP-WI8CLETSERVER1LISA-PCJOHN-PCDESKTOP-B0T93D6
                            DESKTOP-1PYKP29DESKTOP-1Y2433R’WILEYPCWORK6C4E733F-C2D9-4RALPHS-PCDESKTOP-WG3MYJSDESKTOP-7XC6GEZ
                            DESKTOP-5OV9S0OQarZhrdBpjORELEEPCARCHIBALDPCJULIA-PCd1bnJkfVlHNETTYPCDESKTOP-BUGIO
                            DESKTOP-CBGPFEE’SERVER-PCTIQIYLA9TW5MDESKTOP-KALVINOCOMPNAME_4047DESKTOP-19OLLTDDESKTOP-DE369SEEA8C2E2A-D017-4
                            AIDANPCLUCAS-PCMARCI-PCACEPCMIKE-PCDESKTOP-IAPKN1PDESKTOP-NTU7VUOLOUISE-PC
                            T00917test42test
                            Hardware IDs
                            671BC5F7-4B0F-FF43-B923-8B1645581DC8
                            7AB5C494-39F5-4941-9163-47F54D6D5016
                            03DE0294-0480-05DE-1A06-350700080009
                            11111111-2222-3333-4444-555555555555
                            6F3CA5EC-BEC9-4A4D-8274-11168F640058
                            ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548
                            4C4C4544-0050-3710-8058-CAC04F59344A
                            00000000-0000-0000-0000-AC1F6BD04972
                            00000000-0000-0000-0000-000000000000
                            5BD24D56-789F-8468-7CDC-CAA7222CC121
                            49434D53-0200-9065-2500-65902500E439
                            49434D53-0200-9036-2500-36902500F022
                            777D84B3-88D1-451C-93E4-D235177420A7
                            49434D53-0200-9036-2500-369025000C65
                            B1112042-52E8-E25B-3655-6A4F54155DBF
                            00000000-0000-0000-0000-AC1F6BD048FE
                            EB16924B-FB6D-4FA1-8666-17B91F62FB37
                            A15A930C-8251-9645-AF63-E45AD728C20C
                            67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3
                            C7D23342-A5D4-68A1-59AC-CF40F735B363
                            63203342-0EB0-AA1A-4DF5-3FB37DBB0670
                            44B94D56-65AB-DC02-86A0-98143A7423BF
                            6608003F-ECE4-494E-B07E-1C4615D1D93C
                            D9142042-8F51-5EFF-D5F8-EE9AE3D1602A
                            49434D53-0200-9036-2500-369025003AF0
                            8B4E8278-525C-7343-B825-280AEBCD3BCB
                            4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27
                            79AF5279-16CF-4094-9758-F88A616D81B4
                            FF577B79-782E-0A4D-8568-B35A9B7EB76B
                            08C1E400-3C56-11EA-8000-3CECEF43FEDE
                            6ECEAF72-3548-476C-BD8D-73134A9182C8
                            49434D53-0200-9036-2500-369025003865
                            119602E8-92F9-BD4B-8979-DA682276D385
                            12204D56-28C0-AB03-51B7-44A8B7525250
                            63FA3342-31C7-4E8E-8089-DAFF6CE5E967
                            365B4000-3B25-11EA-8000-3CECEF44010C
                            D8C30328-1B06-4611-8E3C-E433F4F9794E
                            00000000-0000-0000-0000-50E5493391EF
                            00000000-0000-0000-0000-AC1F6BD04D98
                            4CB82042-BA8F-1748-C941-363C391CA7F3
                            B6464A2B-92C7-4B95-A2D0-E5410081B812
                            BB233342-2E01-718F-D4A1-E7F69D026428
                            9921DE3A-5C1A-DF11-9078-563412000026
                            CC5B3F62-2A04-4D2E-A46C-AA41B7050712
                            00000000-0000-0000-0000-AC1F6BD04986
                            C249957A-AA08-4B21-933F-9271BEC63C85
                            BE784D56-81F5-2C8D-9D4B-5AB56F05D86E
                            ACA69200-3C4C-11EA-8000-3CECEF4401AA
                            3F284CA4-8BDF-489B-A273-41B44D668F6D
                            BB64E044-87BA-C847-BC0A-C797D1A16A50
                            2E6FB594-9D55-4424-8E74-CE25A25E36B0
                            42A82042-3F13-512F-5E3D-6BF4FFFD8518
                            38AB3342-66B0-7175-0B23-F390B3728B78
                            48941AE9-D52F-11DF-BBDA-503734826431
                            032E02B4-0499-05C3-0806-3C0700080009
                            DD9C3342-FB80-9A31-EB04-5794E5AE2B4C
                            E08DE9AA-C704-4261-B32D-57B2A3993518
                            07E42E42-F43D-3E1C-1C6B-9C7AC120F3B9
                            88DC3342-12E6-7D62-B0AE-C80E578E7B07
                            5E3E7FE0-2636-4CB7-84F5-8D2650FFEC0E
                            96BB3342-6335-0FA8-BA29-E1BA5D8FEFBE
                            0934E336-72E4-4E6A-B3E5-383BD8E938C3
                            12EE3342-87A2-32DE-A390-4C2DA4D512E9
                            38813342-D7D0-DFC8-C56F-7FC9DFE5C972
                            8DA62042-8B59-B4E3-D232-38B29A10964A
                            3A9F3342-D1F2-DF37-68AE-C10F60BFB462
                            F5744000-3C78-11EA-8000-3CECEF43FEFE
                            FA8C2042-205D-13B0-FCB5-C5CC55577A35
                            C6B32042-4EC3-6FDF-C725-6F63914DA7C7
                            FCE23342-91F1-EAFC-BA97-5AAE4509E173
                            CF1BE00F-4AAF-455E-8DCD-B5B09B6BFA8F
                            050C3342-FADD-AEDF-EF24-C6454E1A73C9
                            4DC32042-E601-F329-21C1-03F27564FD6C
                            DEAEB8CE-A573-9F48-BD40-62ED6C223F20
                            05790C00-3B21-11EA-8000-3CECEF4400D0
                            5EBD2E42-1DB8-78A6-0EC3-031B661D5C57
                            9C6D1742-046D-BC94-ED09-C36F70CC9A91
                            907A2A79-7116-4CB6-9FA5-E5A58C4587CD
                            A9C83342-4800-0578-1EE8-BA26D2A678D2
                            D7382042-00A0-A6F0-1E51-FD1BBF06CD71
                            1D4D3342-D6C4-710C-98A3-9CC6571234D5
                            CE352E42-9339-8484-293A-BD50CDC639A5
                            60C83342-0A97-928D-7316-5F1080A78E72
                            02AD9898-FA37-11EB-AC55-1D0C0A67EA8A
                            DBCC3514-FA57-477D-9D1F-1CAF4CC92D0F
                            FED63342-E0D6-C669-D53F-253D696D74DA
                            2DD1B176-C043-49A4-830F-C623FFB88F3C
                            4729AEB0-FC07-11E3-9673-CE39E79C8A00
                            84FE3342-6C67-5FC6-5639-9B3CA3D775A1
                            DBC22E42-59F7-1329-D9F2-E78A2EE5BD0D
                            CEFC836C-8CB1-45A6-ADD7-209085EE2A57
                            A7721742-BE24-8A1C-B859-D7F8251A83D3
                            3F3C58D1-B4F2-4019-B2A2-2A500E96AF2E
                            D2DC3342-396C-6737-A8F6-0C6673C1DE08
                            EADD1742-4807-00A0-F92E-CCD933E9D8C1
                            AF1B2042-4B90-0000-A4E4-632A1C8C7EB1
                            FE455D1A-BE27-4BA4-96C8-967A6D3A9661
                            921E2042-70D3-F9F1-8CBD-B398A21F89C6
                            Process names
                            cheatengineCheat enginex32dbg’x64dbgollydbgwindbgida
                            ida64ghidraradare2radaredbgimmunitydbgdnspy
                            softiceedbdebuggerVisual studio debuggerlldbgdbvalgrind
                            hex-raysdisassemblertracerdebugviewprocdumpstraceltrace
                            drmemorydecompilerhopperBinary ninjabochsvdbfrida
                            Api monitorProcess hackersysinternalsprocexpProcess explorerMonitor toolvmmap
                            xperfperfviewpy-spystrace-log

                            Additionally, the infostealer modifies the hosts file to redirect DNS requests for specific security vendor domains to localhost, effectively blocking access to those vendors.

                            Data targeted by RedTiger

                            The sections below describe the data targeted by RedTiger and the techniques used to collect them.

                            Sensitive Discord information, through app modification

                            Among the information that RedTiger targets is Discord account and payment information. It starts by defining two regular expressions to capture both plain and encrypted Discord tokens. It will then locate the database files (*.log and *ldb) of Discord or browser applications, terminate the process, and then search for the Discord token using the regular expressions.

                            Once it collects the Discord token, it will run a function used to validate the token. It does so by sending a GET request to the Discord API endpoint /users/@me, which returns True if the Discord API returns 200 HTTP status.

                            Once the Discord tokens are validated, it will send another GET request to the same API endpoint, and collect several details including username, global displayname, user ID, email and verification status and MFA setting, and subscription level.

                            The RedTiger infostealer then proceeds to siphon the victim’s banking information saved in Discord. This includes bank payment information, PayPal account, and promotion codes. It does so by sending a GET request to Discord’s API endpoint using the stolen token.

                            Lastly, the infostealer injects a custom JavaScript into Discord’s client index.js file (discord_desktop_core) to monitor and intercept Discord traffic. It intercepts API calls to Discord, Braintree, and Stripe and inspects the data sent for event-specific keywords to selectively capture traffic. It monitors several activities, including payment information modification, purchases, login activities (including MFA), and downloading billing information.

                            Notably, one of the events monitored is changing the victim’s email address and password. This means that even if the victim changes their password, the infostealer will still grab the new credentials, along with the new Discord tokens.

                            The table below summarizes the endpoint and event that the infostealer is targeting.

                            API EndpointEvent/Action
                            /auth/loginUser logging in (captures username/email & password)
                            /users/@me (GET/PATCH)Fetching or updating user profile (captures token, email change, password change, MFA, etc.)
                            /users/@me PATCHChanging user details (password/email change, profile updates)
                            /billing/payment-sources (Stripe API)Adding or modifying billing/payment sources (captures card/PayPal details)
                            /store/skus/*/purchase (Stripe API)Purchasing Discord Nitro or other store items (captures Nitro gift codes, payment info)
                            /tokens (Stripe API)Adding a new credit card

                            Sensitive files

                            Another target of the RedTiger infostealer is a set of files in user profile directories that have filenames matching predefined keywords. It scans for files ending in .txt, .sql, or .zip. If the filename exactly matches one of the configured keywords, the file is added to a ZIP archive under the internal path Interesting Files with a randomized suffix to avoid name collisions.

                            Game and crypto wallet data

                            The RedTiger infostealer targets cryptocurrency wallets and game-related applications. It attempts to terminate associated processes to release locked files, copies the specified directories and files from a predefined list, records the original path in a path.txt file, and stores all collected data inside the archive under Session Files/<AppName>/Files/.

                            In addition to targeting other game-related applications, the infostealer has a separate function to steal Roblox account information stored in the browser. It uses the Python browser_cookie3 module to extract cookies for the “roblox.com” domain, then extracts info for GET requests to the “/mobileapi/userinfo” API endpoint to parse the data of interest.

                            Browser data and credit card information

                            Similar to the Python NodeStealer previously reported, RedTiger also targets information saved in the browser, including passwords, cookies, download and browsing history, credit card information, and extensions.

                            The RedTiger infostealer targets a wide range of browsers, including major browsers and some of their release channels. The distinction was made because the folder paths of release channels are different.

                            Targeted browsers
                            Google ChromeGoogle Chrome BetaGoogle Chrome DevGoogle Chrome CanaryGoogle Chrome UnstableOpera
                            Opera GXOpera NeonBraveVivaldiInternet ExplorerAmigo
                            TorchKometaOrbitumCent Browser7StarSputnik
                            Epic Privacy BrowserUranYandexYandex CanaryYandex DeveloperYandex Beta
                            Yandex TechYandex SxSIridumMozilla FirefoxSafariMicrosoft Edge

                            Webcam and screen capture

                            The RedTiger infostealer can capture both a webcam snapshot and a screenshot of the victim’s primary desktop screen. It uses the cv2 (OpenCV) module to access the default webcam, capture a single image, convert it from BGR to RGB, and release the camera so it will be available for use by other applications. For screenshots, it uses the Pillow (PIL) module’s ImageGrab().grab function to capture the desktop, compress the image, and save it as “Screenshot.png” directly into the ZIP archive, using the same in-memory buffer as the webcam image.

                            Netskope Detection

                            • Netskope Threat Protection
                              • Win64.Trojan.RedTiger
                            • Netskope Advanced Threat Protection provides proactive coverage against this threat.
                              • Gen.Detect.By.NSCloudSandbox.tr

                            Conclusions

                            The new, open-source RedTiger infostealer has recently emerged in the wild, primarily targeting victims’ Discord accounts, Roblox credentials, browser data (including cookies, passwords, and browsing history), and cryptocurrency wallet files. By uploading stolen data to GoFile cloud storage and sending download links via Discord webhook, RedTiger enables attackers to efficiently exfiltrate sensitive information while evading detection. Netskope Threat Labs will continue to monitor information stealers, including any developments related to the RedTiger infostealer. 

                            IOCs

                            All the IOCs and scripts related to this malware can be found in our GitHub repository.

                            author image
                            Jan Michael Alcantara
                            Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
                            Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
                            Connectez-vous avec Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.