Unveiling Members Hub: A Large-Scale Campaign to Artificially Boost Discord Server Metrics
Members Hub is conducting large-scale campaigns to artificially boost Discord server metrics, undermining community trust and platform integrity.
Kush Pandya
October 2, 2024
During a routine threat feed review, our security team stumbled upon a package named worker-czda with suspicious activity involving the download and execution of code from a specific URL. Upon deeper investigation, this led to the discovery of Members Hub, a sophisticated Discord "server boosting" service. This service is capable of artificially inflating server metrics by simulating user activity.
While not malicious in the traditional sense, this Discord server boosting service poses significant threats to the integrity of the Discord platform and its community. By artificially inflating server metrics and simulating user activity, this service undermines the authenticity of Discord communities and violates the platform's Terms of Service. The sophisticated nature of this operation raises concerns about the scale at which server statistics can be manipulated, potentially affecting user trust, server rankings, and the overall Discord ecosystem.
Moreover, the collection and use of user tokens, even if provided willingly, presents serious security and privacy risks. If this service were to be compromised, thousands of Discord accounts could be at risk of unauthorized access or misuse.
The investigation has uncovered a multi-component system designed to boost Discord server metrics. The system includes a main client for managing operations, a token management module, and several activity simulation scripts. These components work together to control multiple Discord accounts simultaneously, simulating user activity to inflate server engagement metrics.
The code demonstrates a high level of sophistication, with features such as:
Centralized control through a WebSocket server
Dynamic activity simulation for multiple popular games
Automated token management and authentication
Error handling and reconnection logic to ensure persistent operation
The domain https://members-hub[.]store appears to be part of a broader campaign offering "server boosting as a service." The sophisticated nature of this code suggests it may be one of several similar operations. The market for artificially boosting online metrics is unfortunately quite large, spanning multiple platforms beyond just Discord.
This Main class is the core of the operation. It initializes the system and fetches necessary files from the control server. The _request_Files method is particularly interesting as it shows how the system authenticates and retrieves operational data.
The system's operation begins with the Main class, which:
Initializes with a password and ID.
Connects to "https://members-hub[.]store/linkbyauth" to authenticate.
Retrieves operational files based on the provided ID.
Loads these files into memory and begins operations.
This process allows the system to dynamically load its operational code, making it highly flexible and potentially difficult to detect or analyze.
On debugging the code, we found that the code fetches an activities.js file
which simulates gaming activity to make controlled accounts appear active and legitimate.
The above code incorporates BlueStacks, a popular Android emulator that allows users to run Android applications on a PC or Mac. BlueStacks might be involved in facilitating gaming activity, such as playing "8 Ball Pool," which could make Discord accounts appear active and legitimate. The boosting service can create the illusion of user engagement, as if real players are using the platform.
Collecting Discord tokens from willing participants or bulk-created accounts.
Connecting to a central control server (wss://alwaysonline.members-hub.store/).
Simulating user activities like playing games to appear legitimate.
Potentially interacting with Discord messages to simulate engagement.
Maintaining persistent connections to boost server member counts.
The system's modular design allows for easy scaling and adaptation. Its use of WebSocket connections ensures real-time control and updates. The activity simulation modules make detection challenging by mimicking normal user behavior across various popular games.
Exploitation potential includes:
Artificial inflation of server metrics (member count, activity levels)
Potential for spam or targeted message campaigns
Manipulation of server rankings or discovery algorithms
Undermining of genuine community engagement
While not directly malicious towards users, this service violates Discord's Terms of Service and can negatively impact the platform's ecosystem. It also poses security risks to participating accounts and could potentially be misused for more harmful purposes if compromised.
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
By Lauren Valencia, Kirill Boychenko - Sep 17, 2025
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.
By Kush Pandya, Peter van der Zee, Olivia Brown, Socket Research Team - Sep 16, 2025