Steganography + Malware - a Match Made in Hacker Heaven
Steganography has been used for centuries to hide a secret message in an otherwise harmless container. Its latest iteration is a malware delivery vehicle. In this webinar we will review how malware developers use steganography for their devious purposes. Traditionally, steganography was leveraged for covert communication (e.g., exfiltration of sensitive data from an organization in the way that bypasses DLP and other security controls). More recently, it has become a carrier for malware. For example, in the latest attack targeting a Nyotron customer, that our endpoint prevention and response (EPR) solution detected and blocked, the Ursnif banking trojan attempted to use steganography to insert a malicious Powershell script into the organization.