{"id":22902,"date":"2019-07-02T08:42:40","date_gmt":"2019-07-02T12:42:40","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=22902"},"modified":"2019-11-15T22:24:22","modified_gmt":"2019-11-15T11:24:22","slug":"digital-steganography","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/digital-steganography\/22902\/","title":{"rendered":"What is digital steganography?"},"content":{"rendered":"<p>We all know what it means to \u201cread between the lines\u201d in a figurative sense, but before we used modern technology to communicate with one another, people sometimes took it literally, such as by writing secret messages in invisible ink between the lines of a seemingly normal letter.<\/p>\n<p>The technique, whereby the author of a message hides secret information inside something that looks innocent on the surface, is known as <em>steganography,<\/em> and it is almost as old as writing itself. Unlike cryptography, which scrambles the message to make it unreadable without the decryption key, the purpose of steganography is to conceal from prying eyes the very existence of the message. As with many other information-handling methods, steganography is now used in digital technologies, too.<\/p>\n<h2>How does digital steganography work?<\/h2>\n<p>A secret message can be hidden in almost any digital object, be it a <a href=\"http:\/\/www.ijettjournal.org\/volume-4\/issue-7\/IJETT-V4I7P186.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">text document<\/a>, <a href=\"https:\/\/threatpost.com\/malware-wordpress-license-key\/141315\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">license key<\/a>, or even <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steganography\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">file extension<\/a>. For example, the editors of Genius.com, a website dedicated to analyzing tracks by rap artists, used two types of apostrophes in their online lyrics that, when combined, made the words \u201cred handed\u201d in Morse code, thereby <a href=\"https:\/\/www.businessinsider.com\/genius-accuses-google-of-copying-its-lyrics-and-diverting-traffic-2019-6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">protecting their unique content from being copied<\/a>.<\/p>\n<p>One of the most convenient \u201ccontainers\u201d for steganographers happens to be media files (images, audio, video, etc.). They are usually quite large to begin with, which allows the added extra to be meatier than in the case of, say, a text document.<\/p>\n<p>Secret information can be written in the <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">file metadata<\/a> or directly in the main content. Let\u2019s take an image as an example. From the computer\u2019s point of view, it is a collection of hundreds of thousands of pixels. Each pixel has a \u201cdescription\u201d \u2014 information about its color.<\/p>\n<p>For the RGB format, which is used in most color pictures, this description takes up 24 bits of memory. If just 1 to 3 bits in the description of some or even all pixels are taken up by secret information, the changes in the picture as a whole are not perceptible. And given the huge number of pixels in images, quite a lot of data can be written into them.<\/p>\n<div align=\"center\">\n<table>\n<tr>\n<td style=\"border-bottom: none\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235435\/Lenna.bmp\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235435\/Lenna.bmp\" alt=\"Original picture used as a medium for steganography\" width=\"512\" height=\"512\" class=\"aligncenter size-full wp-image-22905\"><\/a><\/td>\n<td style=\"border-bottom: none\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235437\/Lenna_stego.bmp\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235437\/Lenna_stego.bmp\" alt=\"Example picture with text hidden by means of steganography\" width=\"512\" height=\"512\" class=\"aligncenter size-full wp-image-22907\"><\/a><\/td>\n<\/tr>\n<\/table>\n<p><em>The left-hand image has no hidden message; the right-hand image contains the first 10 chapters of Nabokov\u2019s <em>Lolita<\/em><\/em>\n<\/p><\/div>\n<p>\u00a0<\/p>\n<p>In most cases, information is hidden in the pixels and extracted from them using special tools. To do so, modern steganographers sometimes write custom scripts, or add the required functionality to programs intended for other purposes. And occasionally they use ready-made code, of which there is plenty online.<\/p>\n<h3>How is digital steganography used?<\/h3>\n<p>Steganography can be applied in computer technologies in numerous ways. It\u2019s possible to hide text in an image, video, or music track \u2014 either for fun or, as in the case above, to protect a file from illegal copying.<\/p>\n<p>Hidden watermarks are another good example of steganography. However, the first thing that comes to mind on the topic of secret messages, in both physical and digital form, is all manner of secret correspondence and espionage.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>A godsend for cyberspies<\/h3>\n<p>Our experts registered a surge in <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2017_kaspersky-lab-identifies-worrying-trend-in-hackers-using-steganography\" target=\"_blank\" rel=\"noopener noreferrer\">cybercriminal interest in steganography 18 months ago<\/a>. Back then, no fewer than three spyware campaigns swam into view, in which victims\u2019 data was sent to C&amp;C servers under the guise of photos and videos.<\/p>\n<p>From the viewpoint of security systems and employees whose job it is to monitor outgoing traffic, there was nothing suspicious about media files being uploaded online. Which is precisely what the criminals were counting on.<\/p>\n<h3>Subtle memes by subtle means<\/h3>\n<p>Another curious piece of <a href=\"https:\/\/www.pcmag.com\/news\/365516\/hacker-uses-internet-meme-to-send-hidden-commands-to-malware\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">spyware<\/a>, meanwhile, received commands through images. The malware communicated with its cybercriminal handlers through the most unlikely source: memes posted on Twitter.<\/p>\n<p>Having gotten onto the victim\u2019s computer, the malware opened the relevant tweet and pulled its instructions from the funny image. Among the commands were:<\/p>\n<ul>\n<li>Take a screenshot of the desktop,<\/li>\n<li>Collect information about running processes,<\/li>\n<li>Copy data from the clipboard,<\/li>\n<li>Write file names from the specified folder.<\/li>\n<\/ul>\n<h3>Image-based code<\/h3>\n<p>Media files can hide not just text, but chunks of malicious code, so other cybercriminals began to follow in the spies\u2019 wake. Using steganography does not turn an image, video, or music track into full-fledged malware, but it can be used to hide a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/payload\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">payload<\/a> from antivirus scans.<\/p>\n<p>In January, for example, attackers distributed an amusing banner through online ad networks. It contained no actual advertising, and looked like a small white rectangle. But inside was a script for execution in a browser. That\u2019s right, scripts can be loaded into an advertising slot to allow, for example, companies to collect ad-viewing statistics.<\/p>\n<div id=\"attachment_27476\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235443\/digital-steganography-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27476\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2019\/07\/02235443\/digital-steganography-3.png\" alt=\"Banner with hidden code\" width=\"800\" height=\"489\" class=\"size-full wp-image-22909\"><\/a><p id=\"caption-attachment-27476\" class=\"wp-caption-text\">Banner with hidden code. Source: <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Confiant blog<\/a><\/p><\/div>\n<p>The cybercriminals\u2019 script recognized the color of the image pixels, and logged it as a set of letters and numbers. This would seem a rather pointless exercise, given that there was nothing to see but a white rectangle. However, seen through the eyes of the program, the pixels were not white, but <em>almost white<\/em>, and this \u201calmost\u201d was converted into <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">malicious code<\/a>, which was duly executed.<\/p>\n<p>The code pulled from the picture redirected the user to the cybercriminals\u2019 website. There, the victim was greeted by a Trojan disguised as an Adobe Flash Player update, which then downloaded other nastiness: in particular, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/adware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">adware<\/a>.<\/p>\n<h3>Detecting steganography ain\u2019t easy<\/h3>\n<p>As expert Simon Wiseman noted at RSA Conference 2018, quality steganography is <a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hta-w02_poison-pixels-combatting-image-steganography-in-cybercrime.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">extremely difficult to spot<\/a>. And getting rid of it is also no picnic. Methods exist for embedding messages in images so deep that they remain even <a href=\"https:\/\/benthamopen.com\/contents\/pdf\/TOAUTOCJ\/TOAUTOCJ-6-84.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">after printing and rescanning<\/a>, resizing, or <a href=\"https:\/\/www.hindawi.com\/journals\/scn\/2018\/6256872\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">other editing<\/a>.<\/p>\n<p>However, as we already mentioned, information (including code) is extracted from images and videos using a special tool. In other words, media files by themselves do not steal or download anything from or to your computer. Therefore, you can secure your device by protecting it against malware components that hide text or malicious code in media files and extract it from them:<\/p>\n<ul>\n<li>Be in no hurry to open links and attachments in e-mails. Read the message carefully. If the sender\u2019s address or the content looks dubious, better to ignore it.<\/li>\n<li>If you need to download something, always use trusted sources \u2014 for example, download apps from official stores or developer websites. The same goes for movies and music \u2014 do not download anything from unknown resources.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com.au\/premium?icid=au_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">robust security solution<\/a>. Even if it fails to recognize image-based code, it can catch suspicious actions by other malware modules.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>A highly creative way to hide information.<\/p>\n","protected":false},"author":2049,"featured_media":22903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1789],"tags":[3148,3149,321],"class_list":{"0":"post-22902","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-digital-steganography","9":"tag-steganography","10":"tag-technology"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/digital-steganography\/22902\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/digital-steganography\/16084\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/digital-steganography\/13590\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/digital-steganography\/17980\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/digital-steganography\/16118\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/digital-steganography\/14859\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/digital-steganography\/18791\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/digital-steganography\/17552\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/digital-steganography\/23025\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/digital-steganography\/6206\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/digital-steganography\/27474\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/digital-steganography\/12132\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/digital-steganography\/10912\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/digital-steganography\/19652\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/digital-steganography\/23548\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/digital-steganography\/18611\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/digital-steganography\/22844\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/technology\/","name":"Technology"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2049"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=22902"}],"version-history":[{"count":16,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22902\/revisions"}],"predecessor-version":[{"id":23776,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22902\/revisions\/23776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/22903"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=22902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=22902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=22902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}