This Novel Malware Uses Discord Emojis to Steal Data (2024)

Quick Links

  • What Is the DISGOMOJI Malware?

  • How Does Emoji-Controlled Malware Work?

  • Is There Any Point to Emoji-Controlled Malware?

It often feels like once you've read about one type of malware, you've heard about most. But then a malware operator starts using emojis to communicate with its infected devices, and you have to pay attention.

First discovered by security research outfit Volexity, the DISGOMOJI malware has a unique identifier: it uses Discord emojis to execute commands on infected devices.

What Is the DISGOMOJI Malware?

Volexity uncovered the DISGOMOJI malware in June 2024, linking it to a Pakistan-based group tracked as UTA0137.

The malware targets Linux devices using the BOSS distribution, mainly used by Indian government agencies. Theoretically, though, it could be used against any Linux distribution and is written in the adaptable Golang programming language.

However, the most interesting part of DISCOMOJI is its use of Discord emojis to control infected devices. Instead of sending commands using words, as you find with most malware, the DISCOMOJI operator can send a specific Discord emoji to prompt an action.

How Does Emoji-Controlled Malware Work?

First, the malware has to be installed for the attacker to gain control of the target device. The target device is sent a fake document containing the malicious file, which, when executed, downloads the DISCOMOJI malware. When launched, DISCOMOJI steals data from the target machine, such as its local information, user names, hostname, the directory the malware is installed in, and data from any connected USB devices.

Then, the malware connects to a Discord server controlled by the attacker, phoning home to wait for new instructions. The attackers use something called discord-c2, an open-source command and control project that uses Discord as the control point for infected devices. Once the malware connects to the Discord server, the attacker can use a range of emojis to prompt the malware, with a string of different parameters available.

The malware Discord emojis are summarized below:

Emoji

Emoji Name

Command Description

๐Ÿƒโ€โ™‚๏ธ

Man Running

Execute a command on the victim's device. This command receives an argument, which is the command to execute.

๐Ÿ“ธ

Camera with Flash

Take a screenshot of the victim's screen and upload it to the command channel as an attachment.

๐Ÿ‘‡

Backhand Index Pointing Down

Download files from the victim's device and upload them to the command channel as attachments. This command receives one argument, which is the path of the file.

โ˜๏ธ

Index Pointing Up

Upload a file to the victim's device. The file to upload is attached along with this emoji.

๐Ÿ‘‰

Backhand Index Pointing Right

Upload a file from the victim's device to Oshi (oshi[.]at), a remote file-storage service. This command receives an argument, which is the name of the file to upload.

๐Ÿ‘ˆ

Backhand Index Pointing Left

Upload a file from the victim's device to transfer[.]sh, a remote file-sharing service. This command receives an argument, which is the name of the file to upload.

๐Ÿ”ฅ

Fire

Find and send all files matching a pre-defined extension list that are present on the victim's device. Files with the following extensions are exfiltrated: CSV, DOC, ISO, JPG, ODP, ODS, ODT, PDF, PPT, RAR, SQL, TAR, XLS, ZIP

๐ŸฆŠ

Fox

Zip all Firefox profiles on the victim's device. These files can be retrieved by the attacker at a later time.

๐Ÿ’€

Skull

Terminate the malware process using os.Exit().

It's cute but strange to think the emojis you use every day are being used to control malware.

Is There Any Point to Emoji-Controlled Malware?

Outside of making it more user-friendly, using emojis for command and communication could help the malware stay undetected for longer. Certainly, Discord may struggle to detect that its servers are being used to run a malicious C2 project if all it does is send commonly used emojis.

The way Discord tokens are managed by the malware makes it harder for Discord to act against the attackerโ€™s servers, as the client configuration can simply be updated by the attacker when required.

So, if persistence is the name of the game, using emojis could be useful.

As for staying safe, this malware primarily targets a specific Linux distribution used in Indian government agencies, which means most regular folks have nothing to worry about. Still, always keep your devices up to date, as you never know what threat might appear next.

  • Security
  • Malware
  • Discord

Your changes have been saved

Email Is sent

Please verify your email address.

Youโ€™ve reached your account maximum for followed topics.

Manage Your List

Follow

Followed

Follow with Notifications

Follow

Unfollow

Readers like you help support MakeUseOf. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

This Novel Malware Uses Discord Emojis to Steal Data (2024)
Top Articles
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 6458

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.