I read steganography is expected to grow increasingly popular with hackers in the near future. How does a hacker...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
use steganography, and how can enterprises best defend against steganography-based attacks?
Steganography is the hiding of a secret message within an ordinary message. Using steganography techniques, like using encryption, helps attackers to minimize the chance of their attack being detected. And like encryption, using steganography techniques effectively requires proper implementation. But as attackers improve their usage of encryption, moving beyond simple ransomware schemes and using it to hide and exfiltrate corporate data, they will need to take additional steps to hide their communications, which could lead to an increase in using steganography techniques. This helps thwart heuristic or behavioral analysis that looks for anomalies in network connections. For example, attackers could use a social network of their choosing for their command-and-control infrastructure in order to hide their communications with the legitimate network traffic to the website. In a targeted attack, an attacker could try to identify the most common social network in use at the enterprise and use that to set up the command-and-control communications for their malware.
Enterprises can defend against attacks that use steganography techniques in much the same way they can defend against attacks using encryption -- by using tools that look for anomalies in protocol or extra data in a communication channel. For example, if a JPEG file looks like a low-quality image when opening it in a picture viewer, but the file is larger than expected, there is a good chance there is something else being stored in the JPEG, requiring further analysis.
Discover ways to detect and mitigate advanced evasion techniques
Dig Deeper on Emerging cyberattacks and threats
Related Q&A from Nick Lewis
An Apache Struts vulnerability is still being exploited, even though it has already been patched. Expert Nick Lewis explains why the Struts platform ...continue reading
A revamped Poison Ivy RAT campaign has been using new evasion and distribution techniques. Expert Nick Lewis explains the new attack methods that ...continue reading
Fileless malware hidden in server memory led to attacks on many companies worldwide. Expert Nick Lewis explains how these attacks fit in with the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.