Malware Hidden In Images Is Used By Hackers

2 Min Read

Malware that utilizes Exchangeable Image File Format (EXIF) data to shroud its code has moved to another stage: GoogleUserContent locales, for example, Google+ and blogger forums.

Using this technique, as observed on Pastebin and GitHub, hackers install code inside transferred and uploaded pictures – a stealthy approach, since pictures are rarely examined for malware, analysts at Sucuri said on Thursday.

These contents can weaponize the site by transferring a predefined web shell and thus, building up backdoor access. Afterward attackers can email the addresses of effectively abused destinations back to them. The persistance to attack this way Google  makes the issue inescapable.

This sort of malware infection (a type of steganography) is possible to execute on any website with downloadable pictures, not simply destinations that were created inside the GoogleUserContent framework. Notwithstanding, the migration of the method to Google is a more serious issue, for two reasons:  Google pictures are downloaded in massive numbers, it’s harder to report any uncovered malware diseases inside that framework, as indicated by Securi.

Fortunately this system is difficult to create on a mass level – widespread site infections would require automation and the precise misuse of vulnerabilities on a particular site.

Share This Article
Leave a comment