Steganography has been used for centuries to hide a secret message in an otherwise harmless container. Its latest iteration is a malware delivery vehicle.
In this webinar we will review how malware developers use steganography for their devious purposes. Traditionally, steganography was leveraged for covert communication (e.g., exfiltration of sensitive data from an organization in the way that bypasses DLP and other security controls). More recently, it has become a carrier for malware. For example, in the latest attack targeting a Nyotron customer, that our endpoint prevention and response (EPR) solution detected and blocked, the Ursnif banking trojan attempted to use steganography to insert a malicious Powershell script into the organization.
Join us for a brief overview of steganography, its use in the physical and digital worlds, followed by a step by step walkthrough and demo of a recent attack leveraging steganography.
Presenter:
Ira Winkler is recognized as one of the world's experts in Internet security, information warfare, information-related crime investigation, and industrial espionage. Mr. Winkler began his career at the National Security Agency (NSA), where he performed cryptoanalysis and was responsible for systems design and implementing security for intelligence collection and analysis systems.
Ira Winkler is the author of multiple cybersecurity books.