{"id":10961,"date":"2022-10-04T17:18:43","date_gmt":"2022-10-04T20:18:43","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10961"},"modified":"2022-10-04T17:18:43","modified_gmt":"2022-10-04T20:18:43","slug":"como-se-oculta-el-malware-en-las-imagenes-y-que-se-puede-hacer-para-evitar-este-ataque","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10961","title":{"rendered":"C\u00f3mo se oculta el malware en las im\u00e1genes y qu\u00e9 se puede hacer para evitar este ataque"},"content":{"rendered":"<p>Hay muchos peligros a tener en cuenta cuando se trata de mantener seguros sus dispositivos y sus datos, incluidos virus, intentos de phishing, redes wifi comprometidas y memorias USB no autorizadas. Pero una forma no tan conocida consiste en inyectar malware en fotos digitales que parecen perfectamente normales. La t\u00e9cnica para hacerlo se conoce como esteganograf\u00eda, que permite ocultar mensajes secreto u objetos dentro de otros, y no siempre se hace de manera maliciosa. El m\u00e9todo aprovecha los datos ocultos que acompa\u00f1an a una imagen, datos que no necesariamente se traducen en p\u00edxeles en la pantalla.<\/p>\n<hr \/>\n<p class=\"sc-77igqf-0 bOfvBY\">There are\u00a0plenty of dangers to watch out for when it comes to keeping your devices and your data safe, including viruses,\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/gizmodo.com\/linkedin-phishing-ad-accounts-facebook-1849337678\" target=\"_blank\" rel=\"noopener\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/linkedin-phishing-ad-accounts-facebook-1849337678&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"f90cadf41b0914d03f2ad05f9d86762e\">phishing attempts<\/a>, compromised wifi networks, and\u00a0rogue USB sticks. Here,\u00a0we\u2019re going to talk about one of the lesser-known threats: Compromised images.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">You might not have realized it, but malware can be injected into digital photos that appear to be perfectly normal. The technique for doing so\u00a0is\u00a0known as\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/en.wikipedia.org\/wiki\/Steganography\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/en.wikipedia.org\/wiki\/Steganography&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"b9a8bcb44d855fc762cf366e71b14ee5\">steganography<\/a>, or\u00a0the practice of hiding one file in another,\u00a0and\u00a0it\u2019s not always done\u00a0maliciously. The method takes advantage of the hidden data that comes along with an image, data which isn\u2019t necessarily translated into pixels on your\u00a0screen.<\/p>\n<p>Almost any image format can be edited to conceal malware, and the more appealing and popular the picture,\u00a0the better: Images from the James Webb telescope\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/www.securonix.com\/blog\/golang-attack-campaign-gowebbfuscator-leverages-office-macros-and-james-webb-images-to-infect-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.securonix.com\/blog\/golang-attack-campaign-gowebbfuscator-leverages-office-macros-and-james-webb-images-to-infect-systems\/&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"5f4afb3d4d2702fac0aa2b55ac59efbe\">were recently used<\/a>\u00a0as part of a malware attack, for example. Typically, these compromised pictures get served to you on\u00a0websites\u00a0or embedded in\u00a0documents.<\/p>\n<figure id=\"attachment_10963\" aria-describedby=\"caption-attachment-10963\" style=\"width: 965px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10963\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/ab1a65acdd5c08f544661ac85cd11509.webp\" alt=\"\" width=\"965\" height=\"543\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/ab1a65acdd5c08f544661ac85cd11509.webp 965w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/ab1a65acdd5c08f544661ac85cd11509-300x169.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/ab1a65acdd5c08f544661ac85cd11509-768x432.webp 768w\" sizes=\"(max-width: 965px) 100vw, 965px\" \/><figcaption id=\"caption-attachment-10963\" class=\"wp-caption-text\">There\u2019s more to image files than meets the eye. Screenshot: Adobe Photoshop Elements<\/figcaption><\/figure>\n<p class=\"sc-77igqf-0 bOfvBY\">Those are the basics, but the exact details of this threat vary between attacks. Malware code can be embedded in an image in a few different ways, for example: Attached to the end of a file, or through slight tweaks to individual bits of\u00a0the code, or through changes to the metadata associated with a file (this metadata also stores the time and date the photo was taken, and other information).<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">In one recent attack, the ObliqueRAT malware\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/threatpost.com\/website-images-obliquerat-malware\/164395\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/threatpost.com\/website-images-obliquerat-malware\/164395\/&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"e08634b929e0f32017b1586a86ebdfde\">was hidden inside<\/a>\u00a0a seemingly ordinary bitmap file displayed in a browser tab. In this case, a Microsoft Office email attachment was used to direct unsuspecting targets towards the image, but a variety of other methods can be deployed as well\u2014as long as the image gets loaded, the exploit can work.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Whatever the details, the image acts as the carrier for something dangerous, like the Trojan horse of Greek lore. Pictures can carry code to cause damage to a system, to set up a ransomware request, or to\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/www.synertechcloud.com\/single-post\/cryptominer-trojan-hiding-within-an-image-file\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.synertechcloud.com\/single-post\/cryptominer-trojan-hiding-within-an-image-file&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"b2f60afba9c65ef74093115d1c3a98a7\">start mining crypto on a computer<\/a>. There are many different variations and possibilities, and of course new threats are being developed all the time. In fact, any file can be used as a\u00a0carrier\u2014videos and documents work as well as images.<\/p>\n<figure id=\"attachment_10964\" aria-describedby=\"caption-attachment-10964\" style=\"width: 965px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10964\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/a44b5101b8b128c614749ad66d5c2bcc.webp\" alt=\"\" width=\"965\" height=\"543\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/a44b5101b8b128c614749ad66d5c2bcc.webp 965w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/a44b5101b8b128c614749ad66d5c2bcc-300x169.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/a44b5101b8b128c614749ad66d5c2bcc-768x432.webp 768w\" sizes=\"(max-width: 965px) 100vw, 965px\" \/><figcaption id=\"caption-attachment-10964\" class=\"wp-caption-text\">Web browsers are well protected against this kind of threat\u2014but keep them updated. Screenshot: Google Chrome<\/figcaption><\/figure>\n<p class=\"sc-77igqf-0 bOfvBY\">One of the reasons these attacks work so well is that an image file seems a lot more innocent than an executable file. Even if you\u2019re unlikely to download and run an app you don\u2019t know anything about, you might be tempted to take a look at a picture someone has sent you\u2014especially if it\u2019s a majestic shot of deep space, as with the James Webb telescope example.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">As with other security threats, bad actors and security experts are in a constant battle to stay ahead: For instance, threat intelligence company Reversing Labs has\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/blog.reversinglabs.com\/blog\/malware-in-images\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/blog.reversinglabs.com\/blog\/malware-in-images&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"bb9068d631b580c011edd87440d11db6\">a great\u00a0blog post<\/a>\u00a0about how the EXIF data attached to an image (those details around when the photo was taken and which camera was used) can be compromised to execute code. There are plenty more examples out there.<\/p>\n<p>At this point,\u00a0you might be wondering if you should ever load an image in your web browser or email client again. The\u00a0setting to block this\u00a0is actually available in most browsers if you really want to be on the safe side\u2014in Chrome, for example, open\u00a0<strong>Settings<\/strong>\u00a0from the menu and then click\u00a0<strong>Privacy and security<\/strong>,\u00a0<strong>Site settings<\/strong>, and\u00a0<strong>Images<\/strong>.<\/p>\n<figure id=\"attachment_10965\" aria-describedby=\"caption-attachment-10965\" style=\"width: 965px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10965\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/62a058c1b3a4a73a77ad22f35738d397.webp\" alt=\"\" width=\"965\" height=\"543\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/62a058c1b3a4a73a77ad22f35738d397.webp 965w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/62a058c1b3a4a73a77ad22f35738d397-300x169.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/10\/62a058c1b3a4a73a77ad22f35738d397-768x432.webp 768w\" sizes=\"(max-width: 965px) 100vw, 965px\" \/><figcaption id=\"caption-attachment-10965\" class=\"wp-caption-text\">Go ultra-secure and turn off images in your browser. Screenshot: Google Chrome<\/figcaption><\/figure>\n<p class=\"sc-77igqf-0 bOfvBY\">The good news is that your web browser will be actively looking for online threats and should shut down the majority of malware attacks that come through images before they can do any damage. Computer security is never 100 percent guaranteed, but you\u2019re most likely going to be fine if you carry on loading images as normal, thanks to the limits that browsers put on what websites are able to do\u2014just make sure that your browser is always\u00a0up to date.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">It\u2019s also worth bearing in mind that almost all the images you see on social media have been modified and compressed on their way to a data server, making it very difficult for a bad actor to hide code that\u2019s still fully preserved by the time the image makes it in front of anyone\u2019s eyeballs. Image-based malware isn\u2019t a particularly common threat, but it\u2019s still worth knowing about and protecting yourself from.<\/p>\n<p>All the same security rules apply to keep yourself safe from image-based attacks as for any other kind of threat. Make sure your programs are always running the very latest versions, be wary of opening anything that comes your way over email and social media (even if it appears to be from someone you trust), and for extra peace of mind,\u00a0get a\u00a0<a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" href=\"https:\/\/lifehacker.com\/use-these-antivirus-and-anti-malware-apps-instead-of-av-1841264690\" target=\"_blank\" rel=\"noopener\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/lifehacker.com\/use-these-antivirus-and-anti-malware-apps-instead-of-av-1841264690&quot;,{&quot;metric25&quot;:1}]]\" data-uri=\"6cdadaaa7a41a0606b05b9e9707d8e39\">third-party security software suite<\/a>\u00a0installed on your computer.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/gizmodo.com\/malware-images-virus-photos-pictures-how-block-antiviru-1849572516\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/gizmodo.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hay muchos peligros a tener en cuenta cuando se trata de mantener seguros sus dispositivos y sus datos, incluidos virus, intentos de phishing, redes wifi&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10961"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10961"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10961\/revisions"}],"predecessor-version":[{"id":10966,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10961\/revisions\/10966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10962"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}