Fake Steam phishing baits victims with free Discord Nitro

Victims end up on a fake page where their credentials are stolen

Hackers are running a new phishing campaign targeting Discord users with a message that offers a fake free month of Nitro.

Security researchers at Malwarebytes said victims who fall for the scam are taken to a spoofed website that looks like a legitimate Discord page where a fake pop-up appears asking for the user’s Steam credentials.

Researchers said the scam is active and circulating Discord. It is either propagated by bot accounts or scammer-controlled accounts.

The phishing campaign starts with a message sent to a user’s direct messages inbox telling the potential victim they can get one month of free Nitro. It claims that all the recipient has to do is just link their Steam account “and enjoy.” 

The URL misspells “Nitro” as “Niltro.” If victims do not see the misspelling and click on the URL, it redirects them to a legitimate-looking Discord landing page with a “Get Nitro” button. 

“Clicking the “Get Nitro” button opens something that deceptively resembles a Steam pop-up, when in fact, it’s actually not a separate window but a part of the website itself,” said researchers.

Researchers said the tactic is like one fraudsters used about two years ago, described here by Reddit user /Bangaladore. The Reddit user discovered the pop-up is not a pop-up.

Related Resource

The state of brand protection 2021

A new front opens up in the war for brand safety

A log-in screen with a red background - whitepaper from MimecastFree download

“If you try to drag the window off of the parent chrome window, what happens? You can’t. It just stops at the edge. If you scroll up and down on the original page, the Steam sign in the [sic] window goes with it. A normal pop-up does not act like this,” the Reddit user said at the time.

When Discord users key in their Steam credentials in the fake pop-up, it will show them the error message saying, “The account name or password that you have entered is incorrect”. Behind the scenes, though, their Steam credentials have already been stored on the fraudulent website.

In this campaign, hackers used 195[dot]133[dot]16[dot]40 as an IP address. There were also over one hundred other scam domains found on the same IP address, including 1nitro.club, appnitro-discord.com, asstralissteam.org.ru, discord-steam-promo.com, among others.

“Stay safe out there! And please don’t just click links that come out of the blue,” warned researchers.

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Recommended

BitMart suspends withdrawals following hack
cryptocurrencies

BitMart suspends withdrawals following hack

6 Dec 2021
Bridging the DevSecOps divide: Spotlight on key relationships
Whitepaper

Bridging the DevSecOps divide: Spotlight on key relationships

3 Dec 2021
Planned Parenthood cyber attack exposes data of 400,000 patients
cyber attacks

Planned Parenthood cyber attack exposes data of 400,000 patients

3 Dec 2021
Bridging the DevSecOps divide: Spotlight on zero trust
Whitepaper

Bridging the DevSecOps divide: Spotlight on zero trust

3 Dec 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021