Steganography and Malware - Concealing Code and C&C Traffic | Trend Micro Security Intelligence Blog

(情報元のブックマーク数

こんなの検知できんぞ。

In our earlier post discussing steganography, I discussed how it is now being used to hide configuration data by malware attackers. Let’s go discuss this subject another facet of this topic in this post: how actual malware code is hidden in similar ways.
Security analysts will probably throw their hands up in the air and say, “we’ve had code hiding within code for years now, that’s not steganography!”. That’s not what I’m talking about. I will talk about how steganography is used with seemingly innocuous data files that actually hide binary code. If the differences sound small to you, I don’t blame you. Hopefully these examples will make things clearer:

Steganography and Malware: Concealing Code and C&C Traffic - TrendLabs Security Intelligence Blog

screenshot