A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The attack leverages hidden malicious code embedded within image files that, when executed, initiates a complex chain of events designed to steal sensitive information from victims’ systems. The malicious code identified includes instructions for harvesting credentials from multiple browsers, with specific functions targeting cookie files, saved passwords, and form data. Users are advised to exercise caution when downloading image files from untrusted sources and ensure their security solutions are updated with the latest definitions. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. “The steganographic technique used in this campaign is particularly sophisticated, making detection challenging for traditional security tools,” noted the researchers in their technical analysis. Broadcom analysts detected that the malware employs a multi-stage infection process that begins with the extraction of the hidden payload from the image file. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The malware authors utilized advanced obfuscation techniques, including base64 encoding within PowerShell scripts to evade detection. This new threat represents a concerning evolution in malware distribution methods, combining social engineering with advanced obfuscation techniques. The initial script, after being extracted from the JPEG file, uses Windows Script Host to execute commands with minimal visibility. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The attack begins with victims being lured into downloading what appears to be a standard JPEG file. The extracted data is then exfiltrated to command-and-control servers while additional payloads are downloaded, including customized versions of known infostealer families such as Vidar, Raccoon, and Redline. However, these images contain concealed malicious scripts that remain undetectable to conventional security measures.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 20 Mar 2025 13:35:08 +0000