liveklion.blogg.se

Use of steganography in cyber espionage
Use of steganography in cyber espionage












So, in order to conceal 1 MB of data, an 8 MB image file is required. What LSB Steganography does is change the last bit of each of those bytes to hide one bit of data. In this type of Steganography, secret information is embedded in the least significant parts of a media file.įor instance, each pixel of an image file is made up of three bytes of data that correspond to the colors red, green, and blue some image formats allocate an additional fourth byte to transparency or alpha. One of the most popular techniques is the LSB Steganography that we talked about earlier. The way that Steganography works is that it hides information so that it does not arouse suspicion.

use of steganography in cyber espionage

Some human rights activists and nonconformists also tend to utilize this method to share sensitive information. Spies use it to covertly communicate with their command center without arousing suspicion among their hosts. These codes are, then, executed with another program after the file is downloaded to the target computer system.Ĭybercriminals are not the only ones who use Steganography.

Use of steganography in cyber espionage code#

Malware developers use Least Significant Bit (LSB) Steganography for hiding code for their malware in images of famous people or famous songs.

use of steganography in cyber espionage

Steganography is used by malicious attackers to execute a wide range of tasks such as hiding malicious payloads and script files.

use of steganography in cyber espionage

The steganographic file is so subtly different from the original that it cannot be immediately detected. Once a user unintentionally downloads the code by opening a file or image, the malware is activated and the hacker gains control of the user’s network or the malware corrupts the content. They do so by altering an ordinary bit of a file and inserting malicious code in it. Steganography is typically used by hackers who want to embed malicious code.












Use of steganography in cyber espionage