Steganography is the act of concealing or hiding a message, file, image, or video within another medium or file in order to conceal its existence.
The main goal or reasons for using steganography is to hide the information in order to make it difficult to detect.
Depending on the type of file used, there are multiple different ways that a file can be hidden within another file.
Steganography is different from cryptography, it doesnt encrypt data which means it cant be classified as either symmetric or asymmetric.
But the main goal is to focus on making the content of a message unreadble or obfuscating it from unexpected or unauthoirzed users.
Obfuscation is a method used in order to attempt to make something unclear or difficult to understand. There are different types of obfuscation when it comes to computers and computer programming.
In the context of steganography, obfuscation helps hide the presence of hidden information within a carrier. Obfuscation can be applied to steganography in many ways.
Some of the following includes data concealment techniques. injecting pseudo-random noise to help mask presence, making a dynamic payload size, and false information insertion.
There are three primary types of files used with obfuscating with steganography:
Image steganography is the practice of hiding data within image files such as .jpeg or .gif file. There are two common ways that this is done: manipulating the bits of a file or by hiding data in the white space.
Image steganography embeds a message into a file by modifying the least significant bit in some of the individual bytes of a file. Because you are modifying the least significant bit, the changes to the file wont be perceptible to anyone viewing the image.
The following is an real world example of image steganography:
With audio steganography, this method takes advantage of the limitations of a human ear.
Ideally, a human ear can detect sounds in the frequency range of 20 Hz and 20 KHz. Additionally, most humans can't detect sounds between 18 KHz and 20 KHz, but these sounds can be detected by most microphones.
These sounds, commonly called audio beacons, are used to identify user activity. With this in mind, there can be manipulation done to audio file in order to add additional data that can be later picked up or determined using microphones or other tools.
Video steganography is an extension of image steganography and it embeds messages into videos.
Videos have become quite popular on the Internet through sites such as Facebook, YouTube, and TikTok. Because video files are typically large, a common method is to modify the least significant bits of some bytes within the file to embed a message.
However, a drawback of video steganography is that it can cause noise in the audio. In order to avoid this, many video steganography methods only modify the image portion of video files and they leave the audio portion intact.
Steganography can be used for both legitimate and illegitimate reasons. In 2022, NASA had released its first images from the Webb Telescope. Some of these images included populer images including the First Deep Field image as well as “Cosmic Cliffs” in Carina image.
These images were popular for a period of time, and had many eyes drawn towards its beauty and detailing. Because of its popularity, it seemed like a perfect attack vector for attackers to prey on victims with. Threat hunters have spotted a new malware campaign which was named “GO#WEBBFUSCATOR” which focused on using image steganography from the famous sapce images by the James Webb telescope.
The campaign focused on lurking users with phishing emails, malicious documents and executables hidden behind these images.
The infection began with a phishing email that had an attached malicious document which was named, “Geos-Rates.docx”. This document had contained external information including a VBS macro that executes if marcos were enabled in MS Office. The code was obfuscated and deep within the file’s metadata. The code downloaded a JPG image named “OxB36F8GEEC634.jpg” from a remote resource and decoded it into an executable using certutil.exe.
When the image was opened, it displayed an image of the famous galaxy cluster but when it was opened with a text editor, the image had additional content which was encoded in base64 that turns into a 64 bit executable.
Obfuscation is used with software code to make it even harder to read. The payload had contained obfuscated code which used a ROT25 algorithm while the binary used XOR. Famous security vendors such as VirusTotal also ran the image as safe or undetected because of use-case alterations that helped pass by signature-based detection tools.
When talking about the malware itself, once executed, the malware first copied itself to the: