Steganography - T1027.003 (c2e147a9-d1a8-4074-811a-d8789202d916)
Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.
Duqu was an early example of malware that used steganography. It encrypted the gathered information from a victim's system and hid it within an image before exfiltrating the image to a C2 server.(Citation: Wikipedia Duqu)
By the end of 2017, a threat group used Invoke-PSImage
to hide PowerShell commands in an image file (.png) and execute the code on a victim's system. In this particular case the PowerShell code downloaded another obfuscated script to gather intelligence from the victim's machine and communicate it back to the adversary.(Citation: McAfee Malicious Doc Targets Pyeongchang Olympics)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Steganography - T1027.003 (c2e147a9-d1a8-4074-811a-d8789202d916) | Attack Pattern | Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) | Attack Pattern | 1 |