fertnewjersey.blogg.se

Use of steganography in cyber espionage
Use of steganography in cyber espionage










use of steganography in cyber espionage

Any ‘secret’ data can be extracted during opening – releasing, for example, malware from inside a. Steganography can further be combined with encryption for the further camouflage of the ‘secret’ data. Least Significant Bit (LSB) is one commonly used steganography technique which embeds malicious content by changing the last few bits in a byte required to encode a message. Usage of steganography in cybercrimeīad actors have started to leverage steganography as a new type of attack, hiding malware and malicious JavaScript within files and sending them to appropriate targets within an organization. The first formally recorded use of the term was in 1499 by Johannes Trithemius in his disquisition on cryptography and steganography, The Steganographia, itself disguised as a book about magic. After the servant’s hair grew back and they reached the message recipient, the receiver shaved the servant’s scalp again to read the message. According to the historian Herodotus, Histiaeus (a tyrant and ruler of Miletus in the late 6th century BCE) shaved the head of one of his servants and tattooed a message onto their scalp.

use of steganography in cyber espionage

This was, in its simplest form, practiced in ancient Greece. Steganography doesn’t just encode a message but instead hides the fact that there is any message at all. Seeing a resurgence of late, bad actors are taking advantage of steganography to circumnavigate cybersecurity, distribute malware, and secure a wider presence with less effort. Steganography is a relatively old technique of hiding ‘secret’ data in plain sight to avoid detection. Steganography is, broadly, a type of covert communication involving the use of any medium to hide messages.












Use of steganography in cyber espionage