Fake Steam phishing baits victims with free Discord Nitro

Victims end up on a fake page where their credentials are stolen

Hackers are running a new phishing campaign targeting Discord users with a message that offers a fake free month of Nitro.

Security researchers at Malwarebytes said victims who fall for the scam are taken to a spoofed website that looks like a legitimate Discord page where a fake pop-up appears asking for the user’s Steam credentials.

Researchers said the scam is active and circulating Discord. It is either propagated by bot accounts or scammer-controlled accounts.

The phishing campaign starts with a message sent to a user’s direct messages inbox telling the potential victim they can get one month of free Nitro. It claims that all the recipient has to do is just link their Steam account “and enjoy.” 

The URL misspells “Nitro” as “Niltro.” If victims do not see the misspelling and click on the URL, it redirects them to a legitimate-looking Discord landing page with a “Get Nitro” button. 

“Clicking the “Get Nitro” button opens something that deceptively resembles a Steam pop-up, when in fact, it’s actually not a separate window but a part of the website itself,” said researchers.

Researchers said the tactic is like one fraudsters used about two years ago, described here by Reddit user /Bangaladore. The Reddit user discovered the pop-up is not a pop-up.

Related Resource

The state of brand protection 2021

A new front opens up in the war for brand safety

A log-in screen with a red background - whitepaper from MimecastFree download

“If you try to drag the window off of the parent chrome window, what happens? You can’t. It just stops at the edge. If you scroll up and down on the original page, the Steam sign in the [sic] window goes with it. A normal pop-up does not act like this,” the Reddit user said at the time.

When Discord users key in their Steam credentials in the fake pop-up, it will show them the error message saying, “The account name or password that you have entered is incorrect”. Behind the scenes, though, their Steam credentials have already been stored on the fraudulent website.

In this campaign, hackers used 195[dot]133[dot]16[dot]40 as an IP address. There were also over one hundred other scam domains found on the same IP address, including 1nitro.club, appnitro-discord.com, asstralissteam.org.ru, discord-steam-promo.com, among others.

“Stay safe out there! And please don’t just click links that come out of the blue,” warned researchers.

Featured Resources

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience

Free Download

Cloud operational excellence

Everything you need to know about optimising your cloud operations

Watch now

A buyer’s guide to board management software

How the right software can improve your board’s performance

The real world business value of Oracle autonomous data warehouse

Lead with a 417% five-year ROI

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
How to speed up Windows 11
Microsoft Windows

How to speed up Windows 11

7 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022