Monday, March 20, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Main Story

Researchers Decode The Stegomalware Surge. What does it mean?

Editorial by Editorial
August 5, 2022
in Main Story
2
Researchers Decode The Stegomalware Surge. What does it mean?
592
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

The cyber monitoring firm, Cyble detected a massive Stegomalware surge, highlighting the notorious malware that uses steganography to hinder detection.

The Cyble Research Labs observed the findings in its routine threat-hunting exercise. On August 4, 2022, it shared an in-depth analysis of the malware and how companies can protect their valuable data against Stegomalware.

You might also like

Artificial Intelligence: The Bridge Between Utopia and Dystopia

‘Pig Butchering’ Scheme: A Tried and Tested Scam Targeting Crypto

ALPHV Ransomware Group Lists Thailand’s Nok Air Airline as Victim 

The firm also shared valuable insights into the growth of malware and how it has been multiplying over time. The organization published a comprehensive study detailing how it found the malware, its reasons for sudden growth, and some cybersecurity practices to establish the first line of defense against cybercriminals.

Here is a trimmed-down version of the Stegomalware analysis.

Stegomalware surge

The company observed the malware from May to July via a distribution chain of Stegomalware on VirusTotal. In the first instance, the company monitored the malware’s existence for over 90 days. In its findings, the malware was spotted over 1,800 times on Image Steganography.

In the second instance, the company tried recreating the malware using steganography. The purpose of this experimentation was linked to how accessible Stegomalware is and how effortless it is to create one using a simple spyware Trojan.

To create a new Stegomalware, the company used a sample of Agent Tesla, an extremely popular spyware Trojan written for the .NET framework. In its raw form, the sample was detected 58/70 times on VirusTotal.

After converting the raw malware into a JPG file with a malicious executable file attached in the background, the final product was detected only 4/59 times on VirusTotal. The experiment showed how obscure Stegomalware is and why it depends on steganography.

Attacks by Stegomalware

On its official website, Cyble provided the findings and a list of recent attacks carried by or aided through Stegomalware. The report also stated that the two attacks happened in July 2022. In the first attack, malicious shell scripts and malware payloads were disseminated to Alibaba OSS Buckets using steganography as the entry point. The same method was used in the second event, where KNOTWEED malware was used to hide Corelump in JPEG files.

In both cases, the malware was concealed within the files, leaving the target parties simply seeing the image. Instead of exploiting an image file, this harmful method uses other programs to propagate malicious code into the system files without the user’s awareness.

How to deal with Stegomalware surge and other malware

At the end of the report, Cyble released its first line of defenses for dealing with notorious malware, such as Stegomalware. Here is a quick look at the best practices to follow:

  1. Keep up with the latest attack technologies by famous Threat Actors.
  2. Monitor threats on a network level. Use a secure antivirus system across all your devices.
  3. Deploy Data Loss Prevention (DLP) services on employees’ systems. Check suspicious images carefully and verify signatures and properties.
  4. Verify the source before downloading any file.
  5. Update your passwords at regular intervals.
  6. Verify the authenticity of the email before opening it.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: cyber expresscyblecyble research labsdata breachmalwareStegomalware surge
Previous Post

Mars Stealer: Researchers Find Fake Website Selling Virus

Next Post

ZB Exchange Hacked, Loses $5 Million

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Artificial Intelligence
Firewall Daily

Artificial Intelligence: The Bridge Between Utopia and Dystopia

by Editorial
February 2, 2023 - Updated on February 27, 2023
Pig Butchering
Firewall Daily

‘Pig Butchering’ Scheme: A Tried and Tested Scam Targeting Crypto

by Editorial
November 22, 2022
Nok Air
Firewall Daily

ALPHV Ransomware Group Lists Thailand’s Nok Air Airline as Victim 

by Editorial
November 21, 2022 - Updated on November 22, 2022
Discord
Firewall Daily

CNIL Sanctions Discord 800,000 Euros for Violating GDPR Policies

by Editorial
November 21, 2022
Breach-hit shareholders Protest at Medibank AGM; Board Saves Its Skin And Pay
Firewall Daily

Breach-hit shareholders Protest at Medibank AGM; Board Saves Its Skin And Pay

by Editorial
November 16, 2022
Next Post
ZB Exchange Hacked, Loses $5 Million

ZB Exchange Hacked, Loses $5 Million

Comments 2

  1. Pingback: Cybersecurity Agencies Reveal The Top Malware Strains of 2021
  2. Pingback: Hackers Exploit Exposed VNC, Access 8000 Systems

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.