Minecraft Modpack DMs Are Actively Stealing Discord Accounts Right Now

Strangers slide into DMs with promises of cool modpacks. Run the file and your Discord token is gone in seconds. Accounts start spamming friends with the same link while Discord support ghosts everyone. This wave is hitting the modded scene hard in May 2026.

If you play modded Minecraft and hang out on Discord there is a decent chance you or someone you know has been hit this week. The attack is not sophisticated. It relies on the oldest trick: some random account messages you about an insane new modpack or shader pack with screenshots that look legit. You click the link, download the zip, extract it, run the jar or exe and boom your Discord token gets exfiltrated.

Same Story Different Week

Reports spiked again around May 5th and 6th. One developer posted that multiple friends were compromised through Minecraft mod packs and that Discord support was responding at a glacial pace with zero useful help. Similar complaints have surfaced on Reddit and elsewhere with the same pattern: hacker changes the email, enables new 2FA backup codes, and immediately pivots to scamming the contact list with more “modpack” links.

  • Targeted DMs pretending to be from fellow players or small modding servers
  • Files that look like Forge or Fabric modpacks but contain stealers
  • Immediate Discord takeover followed by lateral spread to friends
  • Support tickets that go unanswered for days while the account does damage
The uncomfortable truth is that this keeps working because a chunk of the Minecraft community will download and run literally anything that promises better textures, more blocks, or exclusive server access. Token stealers have been documented for years. The modding ecosystem is the perfect delivery mechanism because curiosity always wins over basic opsec. Discord knows this happens at scale yet the response remains ticket roulette.

Public service announcements like the one on GitHub have been circulating for a while detailing exactly how these Minecraft loggers grab Discord data from local storage and exfil it. Checkpoint Research documented similar campaigns last year using fake mods. None of it has stopped the attacks because the social engineering part is too effective and the barrier to creating new variants is too low.

Repository visuals and screenshots explaining Minecraft modpack Discord token stealers
Public service announcement repository detailing how modpacks grab Discord tokens Source

There’s a hack focused around Minecraft mod packs making its way around Discord, taking over people’s accounts. Discord support is moving at a glacial pace.

Screenshot from the original May 2026 Discord warning post about Minecraft modpack token stealers
Original warning post detailing the active wave of modpack-based Discord account theft Source

This is not some sophisticated nation-state operation. It is low effort malware paired with decent social engineering that preys on the always-online modded multiplayer crowd. The stakes are real: lost accounts, compromised friends lists, potential credential dumps beyond just Discord, and hours wasted recovering what you can. Mojang stays silent because it is not their launcher. Discord treats it as user error until the volume gets high enough for PR damage.

What Actually Works

  • Never run executables or jars sent in random DMs no matter how convincing the screenshots look
  • Use a separate non-gaming Discord account for modding communities if you must test random packs
  • Enable proper 2FA with an authenticator app and do not store backup codes in the same places
  • Scan anything downloaded with up to date malware tools before execution

The modded Minecraft scene will keep getting burned until either the platforms get serious about DM file scanning and token invalidation or the playerbase develops some collective skepticism. Right now neither is happening so the stealers keep eating.