Steganography

GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections

Recent campaigns targeting victims through social engineering tactics utilize LUMMA STEALER with GHOSTPULSE as its loader. By tricking victims into…

2 weeks ago

StegCracker – Brute-force Utility to Uncover Hidden Data Inside Files

Steganography is the art of hiding messages covertly so that the sender and recipient know the original message. This technique…

1 year ago

OceanLotus APT Hackers Group using Steganography to Launch an Encrypted Malware Payload via .png Image File

A Well-known APT Group OceanLotus leveraging a steganography method to hide the encrypted malware payload within a .png image file…

6 years ago

Hackers using steganography to Drop the Powload Malware & Hide Their Malvertising Traffic

Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted…

6 years ago

Hackers Now Launching Powerful Weaponized PDF Exploit using Steganography Technique

Cyber Criminals now using new Stenography technique to distribute a powerful Obfuscated PDF exploit in order to compromise the targets…

6 years ago

Risk with Steganography and Importance of running Steganalysis with Network Systems

Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message.…

7 years ago

A New Hacking Group Spreading Sophisticated “Daserf” Backdoor using Steganography

A new Cyber cyberespionage group called REDBALDKNIGHT Spreading advance Daserf Backdoor against Japanese based government agencies such as biotechnology, electronics…

7 years ago