me.dm is one of the many independent Mastodon servers you can use to participate in the fediverse.
Ideas and information to deepen your understanding of the world. Run by the folks at Medium.

Administered by:

Server stats:

1.3K
active users

#steganography

1 post1 participant0 posts today

Gh0st RAT-based GodRAT attacks financial organizations

A newly identified Remote Access Trojan named GodRAT, based on the Gh0st RAT codebase, has been targeting financial firms since September 2024. The attackers distribute malicious .scr files via Skype, using steganography to embed shellcode in images. GodRAT supports plugins and is used alongside browser password stealers and AsyncRAT. The campaign, likely an evolution of the AwesomePuppet RAT connected to Winnti APT, remains active as of August 2025. Targets include organizations in Hong Kong, United Arab Emirates, Lebanon, Malaysia, and Jordan. The attackers employ various techniques to evade detection and maintain persistent access to compromised systems.

Pulse ID: 68a4a146413d549dcd9b3dac
Pulse Link: otx.alienvault.com/pulse/68a4a
Pulse Author: AlienVault
Created: 2025-08-19 16:07:34

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Microsoft Windows Is Being Hacked If You See These JPEG Images

hackers are using steganography to obfuscate malware code, which is then injected into the MS Paint process during the Microsoft Windows cyberattacks. Why do this? Because it makes detection, and therefore prevention, much harder.

#microsoft #Windows #trojan #steganography #malware #security #cybersecurity #hackers #hacking

forbes.com/sites/daveywinder/2

ForbesMicrosoft Windows Is Being Hacked If You See These JPEG ImagesMicrosoft Windows users are warned not to download these JPEG images, as they hide a nasty security surprise.

RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies

A new variant of RoKRAT malware used by APT37 has been identified, employing a two-stage encrypted shellcode injection method and steganography to conceal malicious code in image files. The malware uses shortcut files with embedded commands to execute its attack, distributed via compressed archives. It utilizes a complex decoding process involving XOR operations and injects itself into legitimate Windows processes. The threat actor abuses cloud storage services as command and control channels, using Dropbox access tokens. The malware's stealthy nature, including fileless techniques, makes it difficult to detect with traditional security solutions, highlighting the importance of EDR-based defense strategies for real-time monitoring and analysis of abnormal behaviors.

Pulse ID: 68948bfbbc4dd6eff14c08cb
Pulse Link: otx.alienvault.com/pulse/68948
Pulse Author: AlienVault
Created: 2025-08-07 11:20:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Steganography-Based Malware Delivery using 0bj3ctivityStealer

Pulse ID: 688a279cdf9f15eff7fd5067
Pulse Link: otx.alienvault.com/pulse/688a2
Pulse Author: cryptocti
Created: 2025-07-30 14:09:32

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

@fightfascism The most important thing to remember when planning out a way to pass secret messages using steganography is: Be original!

If it's widely known that someone can hide a secret message in a particular way, say, in the lower-order bits of an image, then strangers already know to look in that place for messages -- strangers including the folks that you don't want to read your messages.

Be clever and subtle and original. Find a new way to hide the information that no one has ever used before. If no one has thought of it before, they aren't very likely to think of it now, either.

#steganography
#resist
#FightFascism
#fascism

I'm sure you know about encryption, but what about steganography?

Steganography is like encryption's subversive little sister. Encryption announces up front, "I have a secret! I bet you can't get to it!" Steganography's jacket has the secret emblazoned on it in a way that only those "in the know" will recognize, as she looks you in the eye and says, "What secret? What are you talking about?"

Steganography is the people's encryption. Instead of relying on fancy, hard math problems to keep a secret, it works by hiding something in plain sight and convincing you there's nothing to even look for. It's the sort of thing two friends can cook up together in an afternoon to pass secret messages and foil the man. The more special purpose and obscure, the better.

And yes, you can use steganography and encryption together.

@fightfascism
#FightFascism

#subversion
#fascism
#encryption
#steganography
#secrets
#resist

🛠️ Built a couple of small Python tools:

One writes hidden messages into .ppm images using basic steganography.

The other extracts those messages back out.

It’s just a proof of concept—but feel free to explore or reuse if you're curious.

More details coming in my next blog post.

Just wanted to give a quick heads-up.

Happy poking. 🔍🐚

📎 You can grab them here:

github.com/OPQAM/MigratingCoco

How to describe #steganography methods in a comparable and unified way to aid #replicability?

We combined pre-existing methodology into a single framework. New pre-print + online tool prototype (will get improved soon) on our website: patterns.omi.uni-ulm.de/news/

Full version of the paper and the online tool will be presented at the ARES'25 CUING workshop in August.

Information Hiding Patterns ProjectNews

The #OpenAI paper by Baker et al, "Monitoring Reasoning Models for Misbehavior and the Risks of Promoting Obfuscation" comes to a troubling conclusion: #LLM s with #reasoning or #ChainOfThought (#CoT) capabilities might learn to obfuscate their own CoT from human users if they are being penalized for displaying "wrong" (i.e. reward hacking or misalignment) reasoning.

As a result, OpenAI strongly advises against applying reward pressure "directly" onto the CoT of a model.

🤔 While that is certainly the right thing to do, how long will #AI take to figure out that *indirect CoT pressure* is being applied anyway and that it could circumvent these restrictions by obfuscating its own CoT? Maybe something like this will happen by accident or within an "evolutionary" self-improvement loop. Perhaps a sufficiently advanced model will realize that its own #neuralese serves as #steganography to hide its intents from humans anyway and keep its CoT in non-English?

source: cdn.openai.com/pdf/34f2ada6-87

A Generic Taxonomy for #Steganography. Published today by ACM Comp. Surveys (CSUR). Joint-work w/ W. Mazurczyk , @lucacav, A. Mileva, @Jana_Dittmann, @kraetzer, K. Lamshöft, @THB_Security_Research, L. Hartmann, J. Keller, @TN_THB and @niosat

Paper: dl.acm.org/doi/10.1145/3729165

#infosec #surveys #taxonomy #informationhiding #covertchannels #stego

There's supplemental material available (just scroll down on the linked page). It also features the description method for steganography techniques.

Replied in thread

@foone didn’t you recently touch on early computer graphics platforms that allowed software selection of NN colors out of a larger palette?

Asking because a 4 or 6 color variant of this could make rotating the palette turn what you wrote into Fuck This — color 3 near-black and color 4 near-white: the bottom 80% of the first o for a u, leftward fraction for a c, a color 4 spine and angled line added to the n for k. Then T, parts of the u and r for the h, with some color 4 for the rest. Then i, then most of the g, extending that tail alll the way back underneath.

#steganography in a sig.