CyberTalk

Hackers hide malware in Windows logo

Windows Steganography Attack concept art

EXECUTIVE SUMMARY:

A cyber espionage group aims to disrupt the governments of several Middle Eastern nations and has previously attacked the stock exchange of an African country, deploying malware to steal large volumes of data.

Attackers conceal malware in the Windows logo

The intrusions have involved a steganographic trick to conceal a previously undocumented backdoor in a Windows logo.

In other words, attackers are stuffing malware into the innocuous looking Windows logos that most people are familiar with, and the malware can be downloaded onto network systems.

Steganography attack

The steganography attacks on one Middle Eastern government agency began in February of this year. Across the next few months, attackers managed to nettle through the network, exfiltrate data and steal sensitive information. This continued through early September, researchers believe.

Responsible party

Cyber security researchers say that it’s too early to say which attack group is responsible for these events, but the attack group is loosely referred to as ‘Witchetty’.

Attacks conducted by Witchetty are identified through the use of two pieces of malware: one known as X4 and a second-stage payload, known as LookBack.

What is steganography?

Steganography is considered a new cyber attack vector. In the digital domain, steganography involves embedding data in non-secret, public information or computer files -such as an image- in order to evade detection.

Types of steganography attacks

1. Text steganography

In a text-based steganography attack, hackers hide malicious code inside of text files. Specifically, hackers alter the text format in the existing file, changing words and creating random characters or sentences.

2. Image steganography

In an image steganography attack, attackers conceal malicious data in an image. Bits or pixels are replaced with malware code. A series of different tactics can be used in image steganography attacks, including masking and filtering, pattern encoding, and cosine transformation methods.

3. Audio steganography

In this type of attack, hackers exploit WAV audio files in order to conceal customized malware.

4. Video steganography

In video steganography attacks, hackers deploy a series of different techniques to hide malicious code within a moving stream of images and audio files.

Preventing steganography attacks

For more on this story, click here. Lastly, to receive cutting-edge cyber security news, insights, best practices and analyses in your inbox each week, sign up for the CyberTalk.org newsletter.

Exit mobile version