Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics like phishing and social engineering to spread malware by disguising themselves. Recently, adversaries were found using a new attack vector called Steganography to deploy malware, evade security scans, and obtain persistence.
By Rudra Srinivas, Senior Feature Writer, CISO MAG
According to a Kaspersky report , threat actors targeted multiple distributors of equipment and software for industrial enterprises to steal credentials using phishing and steganography techniques.
What is Steganography?
In general, steganography is an ancient art of hiding information in images and paintings. Most artists use this technique to conceal their signatures and other hidden messages within their paintings. Even kings used this data hiding technique to send secret messages to their soldiers in the warzone.
Use of Steganography in Cyberattacks
Types of Steganography Attacks
Based on the targets, the attackers use different types of steganography attacks, which include:
1. Text Steganography
In a Text Steganography attack, hackers conceal information (malware code) inside the text files. Bad actors do this by altering the text format in the existing file, such as changing words, creating random characters or sentences.
2. Image Steganography
Attackers hide malicious data in images in an Image steganography attack. They exploit the large number of bits or pixels in an image and replace them with malware codes. Threat actors leverage different tactics to establish image steganography attacks, including the Least significant bit insertion, Masking and Filtering, Pattern encoding, Coding, and Cosine transformation methods.
3. Audio Steganography
In an Audio steganography attack, threat actors exploit WAV audio files to hide their customized malware. Attackers embed the malicious code within the WAV audio files that contain a loader component to decode and execute malicious content embedded in audio files.
4. Video Steganography
Video steganography is a combination of both text and image-based steganography attacks. Adversaries embed a large amount of malicious data inside the moving stream of images and audio files.
How Do You Prevent Steganography Attacks?
- Avoid employees downloading software and other applications from unknown sources as they may contain steganographic codes.
- Never click/open/download suspicious text/audio/image files from unknown sources.
- Closely monitor the software distribution procedures in your organizations to identify malicious insiders.
- Train employees on various phishing and social engineering lures.
- Use anti-malware tools to identify the presence of malware in the files, text docs, images received from unknown sources.
About the Author
Rudra Srinivas is a Senior Feature Writer and part of the editorial team at CISO MAG. He writes news and feature stories on cybersecurity trends.
More from the Rudra.