Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - What about a nice warm cup of Geek?

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. K-Lite Mega Codec Pack
5. Sergei Strelec's WinPE
6. FlyOobe / Flyby11
7. Visual C++ Redistributable Runtimes AIO Repack
8. Unlocker
9. MusicBee
10. Fortect
More >>

top reads

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025

Star Fedora 42 - It Might Be the Prettiest Linux Yet

Star How to Set Up an Automatic Backup Plan In a Few Clicks

Star How To Skip Windows 11 Hardware Checks & Keep Windows 10 in 2025 - The Ultimate Guide

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star How To Use VLC Media Player to Trim Video Clips


MajorGeeks.Com » News » February 2014 » New hard to detect malware discovered in PNG image files

New hard to detect malware discovered in PNG image files


Posted by: Timothy Tibbetts on 02/06/2014 06:46 AM [ comments Comments ]


ThreatPost says that researchers have discovered a relatively new way to distribute malware that relies on reading JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections.


The uniqueness is not in the use of an iFrame tag to embed the content, but rather in how it distributes the malware. You see, the attacker obfuscated the payload inside a PNG file.

You see, the iFrame was loading a valid file, nothing malicious, it was a JavaScript file, jquery.js. For all intents and purposed, the file was good. Here, look for yourself:



This is unique because in the level of effort being taken to obfuscate the payload. Most scanners today will not decode the meta in the image, they would stop at the JavaScript that is being loaded, but they won’t follow the cookie trail. This also talks to the benefit, at least for attackers, it’s exceptionally difficult to detect.

Do make note however that while in this specific case we’re talking about PNG, the concepts do and can apply to other image file types as well. This only puts more emphasis on the importance of being aware of the state of your web server, understanding what files are and aren’t being added and modified and ensuring that vulnerabilities are not being exploited.

Further details available at http://blog.sucuri.net/2014/02/new-iframe-injections-leverage-png-image-metadata.html


« CHP officer detains firefighter at active crash scene (Video) · New hard to detect malware discovered in PNG image files · Watch out for the new Comcast modem and routers »




Comments
comments powered by Disqus

MajorGeeks.Com » News » February 2014 » New hard to detect malware discovered in PNG image files

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition