Tag

Steganography

All articles tagged with #steganography

technology28 days ago

17 Firefox Extensions Offer Free VPN and Tools but Conceal Malware

At least 17 seemingly harmless Firefox extensions have been found to hide malware in their icons using steganography, leading to over 50,000 downloads and ongoing infections. The malware can monitor browsing, strip security protections, and open backdoors, with attackers using sophisticated techniques to evade detection. Users are warned to be cautious of such extensions, as many remain available on the Firefox Add-ons marketplace.

cybersecurity5 months ago

North Korean Hackers Use JPEG Files to Bypass Windows Security

North Korea's APT37 group is using sophisticated malware embedded in JPEG images and leveraging steganography to evade detection and attack Windows systems, primarily in South Korea. The malware employs multi-stage shellcode injection, fileless techniques, and cloud API abuse for command and control, highlighting the need for advanced behavioral detection and proactive security measures.

cybersecurity1 year ago

"Global Enterprises Hit by Steganography Malware Attacks"

The threat actor TA558 has been using steganography to deliver various malware including Agent Tesla, FormBook, Remcos RAT, and others, with a campaign codenamed SteganoAmor. They have targeted sectors in Latin American countries and other regions, while also deploying Venom RAT via phishing attacks in several countries. The group has been observed using compromised SMTP servers and infected FTP servers to stage attacks and steal data. Additionally, another hacking group, Lazy Koala, has been targeting government organizations with a malware called LazyStealer, potentially linked to the group YoroTrooper. This activity is part of a broader trend of social engineering campaigns to spread malware.

cybersecurity1 year ago

"Global Organizations Targeted by New SteganoAmor Steganography Attacks"

The TA558 hacking group has launched a new campaign called "SteganoAmor," utilizing steganography to conceal malicious code inside images and target over 320 organizations globally. The attacks begin with emails containing document attachments that exploit a Microsoft Office vulnerability, leading to the download of various malware tools. The group's use of steganography makes detection challenging, and the attacks have affected multiple sectors and countries. Updating Microsoft Office to a more recent version can effectively defend against these attacks, and a list of indicators of compromise (IoCs) is available for reference.

science-and-technology2 years ago

"Unlocking the Potential: Repurposing Human Hair Waste through Hair Fluorescence"

Physicists from the National University of Singapore have developed a method to repurpose human hair waste by transforming it into a functional material. By using a simple heat-based process, the researchers were able to enhance the fluorescence capability of human hair, allowing it to be used for encrypting sensitive information or detecting environmental pollutants. The heat-treated hair can be engraved with patterns using a laser or used to detect toxic spills, such as methylene blue pollution. This innovative approach offers a sustainable solution for managing hair waste and has potential applications in steganography and pollution detection.