LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

An Easy Introduction to Steganography

Some time ago, a person reached out to Trustwave to get answers regarding some news that he saw about Steganography. After this, I noticed that not many people understand what steganography is and the risks it presents for companies. In this post, I will try to help you understand in an easy way what you need to know about this kind of attack. Here are the questions we were asked:

What is steganography?

Steganography is defined as "the art of hiding messages inside media files", in other words, it is the way in which we can hide any message (text, image, audio, …) inside any file (.mp3, .wav, .png, …). This helps people to make sure that only those who know about the presence of the message can obtain it. There are many different methods of performing steganography, but the most famous are the LSB (Least Significant Bit) ones. This kind of method modifies the LSB of different bytes with a bit from the message that will be hidden.

Is it a big problem for companies?

This can be a really big problem since it is a really easy way for getting sensitive information out of organizations without detection. It is easy to download steganography software for embedding files, like contracts or client lists, into any image that looks common, maybe the company's logo, and then take it out of the company without anyone noticing it.

9452_5a3a9b30-5b06-4fe4-aa54-a5b74a6f8dd8

What can organizations do to mitigate the problem?

Steganalysis is the art of analyzing files for the presence of data hidden by steganography and potentially recovering that data. There are different steganalytic methods for trying to detect if any file has been modified, so it is a really difficult task to configure an environment where you are 100% safe against these kind of attacks. As I mention in my blog post series about steganography, (And Then? Where is the Risk with Steganography? ) you can configure a detection system in your network to try to prevent those modified files from traversing your network, but as I also mention, it is almost impossible to have a 100% safe environment because of all the various steganography methods that cyber criminals could be using.

Common steganalysis methods are not integral, meaning that each method only works for a specific or a couple of steganographic methods. For example, you can have a module that works with LSB steganographic methods but it cannot detect any other methods. If you want to have a secure network from the perspective of steganalysis, you need to have many different modules for different methods.

Currently there are not a lot of good solutions to prevent steganography and many of them require files to be tested one by one. Because of this, it is really important to start developing new tools that companies can use for automatic detection of steganographic manipulated files.

Will there be more steganalytic issues in the future?

Of course, if only because there will be many different attacks in the future. Research in the field of steganalysis is still in progress and many different new methods appear every day. People find new techniques for getting what they want all the time, so it is our duty to be prepared to protect our valuable information in the best way we can.

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo