Feeds

Intruder alert: Cyber thugs are using steganography to slip in malware badness

Signature-sniffers WILL be fooled – researcher

Intelligent flash storage arrays

Common or garden cybercrooks have taken to using steganography – the art of hiding secret information within another image or message file – to run a click-fraud scam.

Steganography has long been the stuff of spy trade-craft and cypherpunk novels, but now cybercrooks have made the practice downmarket by applying it to the Lurk malware downloader.

Lurk uses an algorithm that can embed encrypted downloader URLs into an image file by inconspicuously manipulating individual pixels. The URLs point to the phone-home command-and-control nodes that issue instructions to compromised machines in the botnet.

Brett Stone-Gross, a security researcher in Dell SecureWorks' Counter Threat Unit Threat Intelligence team, told El Reg that the tactic helps smuggle the malware past basic signature-based intrusion detection systems.

The malware package is designed to download and execute secondary malware payloads, in particular packages used to commit click fraud. Lurk-flinging cybercrooks have infected over 350,000 computers, turning them into click-fraud bots that have earned them thousands of dollars, Dell SecureWorks estimates.

Lurk malware was first detected in February 2014 by a security researcher known as Kafeine. Early versions of Lurk spread through an HTML iFrame on compromised websites that relied on a Flash-based exploit (CVE-2013-5330) in order to infect the computers of passing surfers.

The malware uses digital steganography to embed data into an image. This helps Lurk avoid detection within compromised environments, increasing its longevity and making life harder for security analysts.

"The Lurk downloader demonstrates the power and versatility of this technique and how it can be used to evade network detection and manual scrutiny by malware researchers," Stone-Gross explained. "Steganography can make it exceedingly difficult to detect the presence of hidden information such as a configuration file, binary update, or bot command, especially in digital files. As a result, the use of steganography in malware may become more prevalent in the future."

Stone-Gross told El Reg that the technique is "relatively easy to implement and hard to detect", adding that he'd only previously seen the type of digital steganography techniques used by Lurk in strains of malware associated with cyber-espionage attacks. "Malware is constantly evolving to stay one step ahead of computer security researchers and law enforcement," he concluded.

Stone-Gross added that the use of public key cryptography by the likes of CryptoLocker and the use of peer-to-peer networks to make botnet infrastructures more resilient to takedown attempts are other examples of this wider trend.

A write-up of the Lurk downloader threat - complete with code analysis - can be found on the Dell SecureWorks blog here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.