Categories: NewsSecurity

Cybercriminals and Cyber Espionage Teams Use Steganography to Cover Their Tracks

Steganography is one of the most powerful and underutilized technologies we know today. Embedding information within images anyone can see is a great way to distribute data to others without relying on third-party communication channels. A new report from Kaspersky Lab shows steganography use is on the rise among both cybercrime groups and individuals conducting cyber espionage.

The Wrong People Are Using Steganography

It is always interesting to read reports regarding steganography usage. Most people tend to forget about this technology even though it has the potential to disrupt communication as we know it. It is a great way to distribute information to people who know what they are looking for. What looks like yet another online image to the rest of the world holds a ton of valuable data which the intended recipient can extract. 

What is rather worrisome, however, is how the wrong entities have seemingly started using this technology for their own benefit. Both cybercrime gangs and entities conducting cyber espionage are relying on this method of communication more often nowadays. Threat actors using this ancient technology to hide data theft and any other malicious activity on infected systems is not a positive development by any means.

A new report from Kaspersky Lab shows at least three massive cyber espionage campaigns in which steganography was employed to hide stolen data. Additionally, this method was utilized to communicate with centralized

Related Post
command-and-control servers used during these attacks. It is unclear how many entities may have been affected by steganography-oriented attacks so far.

Cybercriminals have taken a liking to steganography as well. This technique is often combined with malware attacks — including the Zeus and Shamoon tools — making things go from bad to worse pretty quickly. Malware developers may look into incorporating steganography as part of their attack strategies moving forward. Should that be the case, they will have an easier time hiding communication with centralized servers, as well as hiding the information they steal.

All this means anti-intrusion tools will need to undergo a major revamp as well. Right now, it is difficult enough for companies to protect themselves from malware and ransomware attacks. Fighting off steganography-based attack vectors have proven nearly impossible so far, although it is not something that could not be achieved. Unfortunately, this trend means any digital file, including images and videos, become potential threats. This is a very disturbing development.

Contrary to what people may think, steganography is not limited to the use of images and videos to hide information either. Threat actors have been using other files as well, including audio files, text files, and domain names, to hide information and communication with command & control servers. Images remain the biggest culprits for now, but it is helpful to know that other file types may play critical roles as well. Thankfully, the amount of information hidden within these files is still fairly limited and is expected to remain so for some time.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Elon Musk Hints At Making Dogecoin A Payment Method For Tesla

Elon Musk has implied the possibility of Dogecoin (DOGE) returning as a payment method for…

17 hours ago

3 Ethereum DeFi Tokens Flashing Buy Signals for September 2024

September 2024 is pivotal for Ethereum's DeFi ecosystem, with several tokens poised for significant growth.…

17 hours ago

Quantum-Proofed IntelMarkets Partners with Ethereum to Grow Bigger While Toncoin Price Enters Choppy Market

With the cryptocurrency market entering the final quarter of the year, analysts are expecting altcoins…

18 hours ago

1inch Team Executes Strategic Token Buyback, Accumulates 34.7M 1INCH

The 1inch team has been strategically maneuvering within the crypto market, recently executing a significant…

2 days ago

Penpie Faces Security Breach, Pendle Takes Swift Action To Protect $105M In Assets

Penpie, a protocol built on top of Pendle, recently experienced a significant security breach that…

2 days ago

Aave Whale Movements: Major Sell-Offs And Strategic Accumulations In The DeFi Space

Aave continues to dominate the DeFi sector, boasting over 80,000 monthly active users. However, recent…

2 days ago