• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Hackers Use WAV Audio Files To Inject Malware And Crypto miners

by Cyber360 News
November 11, 2019
in Security
0
Hackers Use WAV Audio Files To Inject Malware And Crypto miners
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Hackers are growing, not only in numbers but also in the sophistication of their methods.

A malware campaign spotted by BlackBerry Cylance this month suggests the use of WAV audio files being used to hide malicious code, a typical example of steganography.

jamf now

Steganography at work

Steganography is a popular technique among hackers to hide malware codes or files under an ordinary-looking file format. This makes it easy to bypass the security firewalls.

The hacking method has been popular in malware campings, however it only revolved around image file formats such as PNG or JEPG.

Crypto miners behind WAV audio files

In this case, the attackers are using ordinarily looking WAV audio files to hide and drop backdoors and crypto mining application named XMRrig. In the report, Cylance says that WAV files would secretly hide a loader component that can be used for decoding and executing malicious code.

Later, the security researchers found out Metasploit and XMRig payloads on the targeted machines, deducing victim’s computers being used for crypto mining and also, for establishing a command and control reverse connection.

Josh Lemos, VP of Research and Intelligence at BlackBerry Cylance told ZDNet that it is the first incident of crypto mining malware being injected with the help of Steganography. However, hackers have previously attempted using an audio file for concealing malware.

The first incident happened in June

Abusing WAV files for injecting malware was first witnessed in an incident back in June.

Waterbug or Turla, a Russian cyber-espionage group was found to be using WAV audio files in order to transfer malicious files from their server to already infected computers.

jamf now

According to Cylance, attributing this month’s attacks to the Turla threat group is difficult since any threat actor could gain the required malicious tools.

It is difficult to deal with Steganography since the usage of known file formats. But on your end, try to avoid downloading audio files from suspicious websites.

Also Read: Researchers Are Developing A Nearly “Zero Energy” Bitcoin Alternative
Cyber360 News

Cyber360 News

Next Post
Popular Linux Sudo Command Has A Flaw: Update It Now

Popular Linux Sudo Command Has A Flaw: Update It Now

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In