Magento Malware Uses Steganography to Steal Payment Card Data

Magento Malware Uses Steganography to Steal Payment Card Data

Malware hides credit card data inside image files

Malvertising Campaign Infected Thousands of Users per Day for More than a Year

Malvertising Campaign Infected Thousands of Users per Day for More than a Year

Campaign affected 22 ad networks, 113 legitimate sites

Malware Coders Find the Perfect Technique to Help RATs Avoid Detection

Malware Coders Find the Perfect Technique to Help RATs Avoid Detection

Crooks use fileless malware combined with steganography

  • Security
  • By Catalin Cimpanu
  • November 19th, 2015
Malware Turns to DNS and Steganography to Hide C&C Communications

Malware Turns to DNS and Steganography to Hide C&C Communications

Malware operations evolve in a clever way

Hackers Cleverly Hide Backdoor Inside the EXIF Data of a Joomla CMS Logo

Hackers Cleverly Hide Backdoor Inside the EXIF Data of a Joomla CMS Logo

Clever technique, but not clever enough to avoid detection

HAMMERTOSS Malware Uses Twitter and GitHub to Disguise Its Activity

HAMMERTOSS Malware Uses Twitter and GitHub to Disguise Its Activity

FireEye researchers attribute it to Russian group APT29

Infections with ZeusVM Banking Malware Expected to Spike As Building Kit Is Leaked

Infections with ZeusVM Banking Malware Expected to Spike As Building Kit Is Leaked

Source code for control panel has also been leaked

Trojan Hiding in PNG Images Hits Healthcare Organizations

Trojan Hiding in PNG Images Hits Healthcare Organizations

Crooks resort to steganography and fileless malware methods

Stegoloader, the Malware That Hides in Image Files

Stegoloader, the Malware That Hides in Image Files

Stegoloader can hide its source code inside a plain PNG file

Vawtrak Trojan Hides Updated Server List in Website Icons

Vawtrak Trojan Hides Updated Server List in Website Icons

Over 13,000 Canadians affected by recent Vawtrak campaign

Siri’s Voice Could Carry Sensitive Info to an Attacker

Siri’s Voice Could Carry Sensitive Info to an Attacker

Researchers draw attention to steganography-based attacks

Lurk Malware Dropper Hides Remote Server Links Inside Images

Lurk Malware Dropper Hides Remote Server Links Inside Images

The use of steganography makes detection of malware information more difficult

BitTorrent Creator Working on Tool That Hides Secrets in Inconspicuous Files

BitTorrent Creator Working on Tool That Hides Secrets in Inconspicuous Files

Bram Cohen is collaborating with a team from Stanford on the project

JPEGs Leveraged for Targeted Attacks

JPEGs Leveraged for Targeted Attacks

Images contained encrypted configuration files and binaries

Hide Data Within Audio Files

Hide Data Within Audio Files

DeepSound can encode secret files in FLAC, WAV, and WMA audio

Secretbook Encodes Hidden Messages in Facebook Photos

Secretbook Encodes Hidden Messages in Facebook Photos

The Chrome extension makes it possible to share messages discreetly

Professional Data Obfuscation Tool

Professional Data Obfuscation Tool

It can split data across multiple carriers, 3-password protection

 
Want more? Browse: