Stegware – part 2

Stegware – part 2

In Part 1, we gave an overview of the growth of stegware (steganography malware) and how security experts underestimate its use as an attack vector. In this blog we look at the ways stealthy stegware is delivered and how this dangerous threat can be so difficult to detect.

In its simplest form, stegware is concealed inside seemingly innocuous digital images. In the burgeoning digital era, cyber attackers used the increasingly multimedia-driven content of the internet to their advantage to conceal their secret code within public images.

As the digital era progressed, cyber attackers deployed new techniques in which to disguise their malicious code. Network steganography became more widely used, taking advantage of the ephemeral nature of network channels.

https://simargl.eu/blog/technical/stegware-part-2

https://simargl.eu/blog/technical/stegware-the-latest-trend-in-cybercrime = part 1


要查看或添加评论,请登录

Jart Armin的更多文章

社区洞察

其他会员也浏览了