Tag: steganography

  • Paper: How It Works: Steganography Hides Malware in Image Files

    Sometimes a picture says more than a thousand words. And sometimes in computer security, a picture contains a thousand words, or rather a lot of commands, used by malware authors to remotely control the malware. This is an example of a technique known as ‘steganography’: hiding data in such a way that it is invisible…

  • VB2015 ‘Steganoprague’ competition

    Use your steganography-detection skills and win a pile of books. As VB2015 is about to begin, we announce the second part of the ‘ Steganoprague ‘ competition. In this part, you will have to find URLs hidden by others inside an image provided by us. The puzzle can be played by anyone, but if you…

  • Steganoprague: a VB2015 competition & puzzle

    Use your obfuscation and deobfuscation skills to win a prize during the VB2015 conference! “It is time for defenders to go on the offence,” wrote Andreas Lindh in Virus Bulletin last year. Indeed, the distinction between defensive and offensive has become increasingly blurred in recent years. Today, we present ‘Steganoprague’: a competition that takes place…

  • Alureon trojan uses steganography to receive commands

    Messages hidden inside images create extra layer of redundancy. Researchers at Microsoft have discovered a new variant of the ‘Alureon’ trojan that uses steganography to make itself invincible against the takedown of botherders’ domains. Steganography , sometimes referred to as ‘hiding in plain sight’, is the art and science of writing messages in such a…