4.9 • 696 Ratings
🗓️ 28 April 2025
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, April 28th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.1 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:12.9 | Well, this weekend we had two interesting diaries that sort of played on each other. |
0:17.3 | First, Xavier talked about a piece of malware that encoded an executable as part of an image. |
0:25.4 | This technique usually called steganography does essentially adjust the value of individual pixels |
0:32.5 | in order to encode the particular binary that's supposed to be either exfiltrated or in this case |
0:38.6 | infiltrated, so it's more here about bypassing network defenses. The initial download |
0:45.9 | malware is actually encoded using Unicode characters, very common, as Xavier points out, |
0:52.4 | in order to make reverse analysis a little bit more |
0:55.5 | difficult. But then the real interesting part is the steganography part, where the attacker |
1:02.8 | sort of extracts the binary from individual pixel values. Often lately, I've seen steganography being used to refer to where an attacker just appends data to an image. |
1:15.6 | In my opinion, that isn't really sort of what steganography is all about because the data is still |
1:20.3 | clearly readable. |
1:22.5 | Steganography usually just means making these sort of subtle adjustments to existing files |
1:27.4 | in order to hide |
1:28.9 | that there is any additional data present. |
1:32.3 | And then the second diary this week was from DDA. |
1:34.8 | DDA, of course, famous for his Python scripts that analyze Malabar, and DDA is walking us |
1:40.6 | through how these tools can be used to analyze a piece of malware like this |
1:45.9 | that hides data in an image. The first tool that the DA is using is his PNG |
1:53.6 | dump tool. PNG is a compressed file format. So in order to get the raw pixel data that you |
2:00.5 | need here to extract the actual pixel data that you need here to extract the actual |
... |
Transcript will be available on the free plan in 23 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.