Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hackers Use Steganography Method To Hide Malware In PNG File

admin by admin
Feb 27, 2024
in News
A A
0

Steganography is employed by threat actors to hide malicious payloads in benign files such as pictures or documents. 

By using this secret tool, threat actors are able to evade security systems and detect and assist in their undercover communications or data exports. 

These things together make the cyber-attacks of the threat actors more operational and sophisticated.

Cybersecurity analysts at Morphisec Threat Labs recently discovered that hackers are actively using the Steganography methods to hide malware in PNG files.

Steganography Malware PNG File

Multiple attack indicators reveal threat actor UAC-0184 delivering Remcos RAT to a Ukrainian entity in Finland, and in this campaign, the IDAT loader is key. 

Targeting Ukraine-based entities, the threat actor aims to expand to affiliated entities. However, Morphisec identifies a specific focus on Ukraine entities in Finland.

The IDAT loader attack utilized steganography to hide malicious code in images or videos. Stego techniques, like embedding code in the least significant bits, evade detection by obfuscating the payload. 

Even with a visibly distorted image, the obfuscation allows successful defense evasion, which enables malware execution in memory. 

Understanding the role of steganography is crucial for effective defense against such tactics.

Remcos is a commercial RAT that enables attackers to control infected computers, steal data, and monitor activities effortlessly.

As per the ANY.RUN report, Remcos has been identified as the most commonly uploaded threat among malware samples.

Morphisec highlighted the Remcos as a threat by detecting it in Guloader and the Babadeda crypter.

It has prevented numerous attacks, with a notable instance occurring in early January 2024. Early detection crucially aided the containment and response efforts.

The UA Cert’s alert validated the threat days later as Morphisec’s research identified shared artifacts and variances in subsequent attacks, which showcased its proactive stance.

Morphisec’s mechanism (Source – Morphisec)

A phishing email posing as an IDF consultant reveals the deceptive recruitment tactics of the 3rd Separate Assault Brigade and IDF.

Phishing email (Source – Morphisec)

The IDAT loader delivers the Remcos RAT, and all the key stages of the attacks are shown in the below payload delivery flow chart:-

Payload Delivery Flow Chart (Source – Morphisec)

IDAT is an advanced loader that deploys Danabot, SystemBC, and RedLine Stealer, which showcase the modular architecture with unique features. 

Its sophisticated techniques include dynamic loading, HTTP connectivity tests, and syscalls for evasion. The infection unfolds in stages by involving module tables and instrumentation shellcode. 

The loader adapts injection or execution based on file type and config flags by embedding the modules within the executable. 

Besides this, the code connects and initiates the downloads from ‘hxxps://aveclagare[.]org/wp-content/plugins/wpstream/public/js/youtube.min.js’ by using the distinctive user-agent ‘racon’ for campaign delivery and connectivity checks.

IDAT’s modular operation uses steganography with a PNG to extract the payload. The embedded value 0xEA79A5C6 marks the starting point. 

The primary goal is to load the ‘PLA.dll’ and employ ‘Module Stomping’ by injecting the next stage code to evade security solutions.

IoCs

IoCs (Source – Morphisec)

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.