Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - What about a nice warm cup of Geek?

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Sergei Strelec's WinPE
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. K-Lite Mega Codec Pack
8. Visual C++ Redistributable Runtimes AIO Repack
9. ImgBurn
10. Sergei Strelec's WinPE 64-Bit for Windows 10 and 11
More >>

top reads

Star 4 Ways To Check System Uptime in Windows 11

Star 6 Ways To Clear Clipboard History

Star How To Enable and Install the Built-In System Monitor (Sysmon)

Star Network Location - What Is It and How To Add It?

Star 4 Ways To Run a Manual Scan With Microsoft Defender

Star How To Easily Backup and Import Windows Defender Firewall Rules

Star How To Install and Restore WMIC in Windows 11

Star How To Bring Back the Classic File Explorer with Ribbon in Windows 11

Star How To Limit Max CPU Usage for Microsoft Defender Scans in Windows 11

Star Recently Opened Files - How To Hide or Show Them In Jump Lists, File Explorer, and Start Menu


MajorGeeks.Com » News » February 2014 » New hard to detect malware discovered in PNG image files

New hard to detect malware discovered in PNG image files


Posted by: Timothy Tibbetts on 02/06/14 01:46 am [ comments Comments ]


ThreatPost says that researchers have discovered a relatively new way to distribute malware that relies on reading JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections.


The uniqueness is not in the use of an iFrame tag to embed the content, but rather in how it distributes the malware. You see, the attacker obfuscated the payload inside a PNG file.

You see, the iFrame was loading a valid file, nothing malicious, it was a JavaScript file, jquery.js. For all intents and purposed, the file was good. Here, look for yourself:



This is unique because in the level of effort being taken to obfuscate the payload. Most scanners today will not decode the meta in the image, they would stop at the JavaScript that is being loaded, but they won’t follow the cookie trail. This also talks to the benefit, at least for attackers, it’s exceptionally difficult to detect.

Do make note however that while in this specific case we’re talking about PNG, the concepts do and can apply to other image file types as well. This only puts more emphasis on the importance of being aware of the state of your web server, understanding what files are and aren’t being added and modified and ensuring that vulnerabilities are not being exploited.

Further details available at http://blog.sucuri.net/2014/02/new-iframe-injections-leverage-png-image-metadata.html


New hard to detect malware discovered in PNG image files




Comments
comments powered by Disqus

MajorGeeks.Com » News » February 2014 » New hard to detect malware discovered in PNG image files

© 2000-2026 MajorGeeks.com
Powered by Contentteller® CMS System