Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Non-scholar athletes argue that the lawsuit has not progressed well enough to amend the lighting rules on the list.

Amazon is peering into the new work of humans in the world of AI bots

Iran enriched nuclear “unnegotiable” before we talk in Oman | Nuclear News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » How Xworm hides in images
Identity

How Xworm hides in images

userBy userMarch 11, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Steganography

Within the most innocent looking images, breathtaking scenery, or funny memes, something dangerous could be hidden and waiting for the moment.

There are no strange file names. There are no anti-virus warnings. Just a harmless image, secretly hides payloads that can steal data, run malware and take over the system without tracing.

This is Steganography, a secret weapon of cybercrime, for hiding malicious code within harmlessly-looking files. By embedding data in images, the attacker avoids detection and relies on separate scripts or processes to extract and execute hidden payloads.

Let’s break down how this works, why it’s so dangerous, and most importantly, how to stop it before it’s too late.

What is steganography in cybersecurity?

Steganography is the practice of hiding data within another file or media. Unlike encryption that scrambles data for easier readability, steganography disguises malicious code in harmlessly-looking images, videos, or audio files, making it almost invisible to traditional security tools.

In a cyberattack, the enemy embed the payload in an image file, which was later extracted and executed in the victim’s system.

Why cybercriminals use steganography:

Security Tool Avoidance: Hidden code in the image bypasses antivirus and firewalls. No suspicious files: The attacker does not need obvious executables. Low detection rate: Traditional security scans rarely inspect malware images. Stealth Payload Delivery: Malware remains hidden until extracted and executed. Bypass email filter: Malicious images do not trigger standard phishing detection. A versatile attack method: Can be used for phishing, malware delivery, and data removal.

How Xworm uses steganography to avoid detection

Let’s take a look at the malware campaigns analyzed within the any.run interactive sandbox, which show you exactly how to use steganography in multi-stage malware infections.

View analysis sessions with XWorm

Steganography Campaign Starting with Fishing PDF

Step 1: Attack starts with a phishing PDF

In any.run sandboxing session, you will see that everything starts with a PDF attachment. This document contains malicious links that trick users into downloading .reg files (Windows Registry Files).

Investigate advanced features of Any.run to uncover hidden threats, enhance threat detection, and actively defend your business from sophisticated attacks.

Try any.run now

At first glance, this may seem unsafe. However, opening a file changes the system registry and plantes hidden scripts that run automatically when the computer restarts.

.REG file used to modify the resist in the .RUN sandbox

Step 2: RegistryScript adds hidden boot process

When the .reg file is executed, the script is gently injected into the Windows Autorun registry key. This ensures that the malware starts the next time the system restarts.

At this stage, no actual malware has been downloaded yet, only dormant scripts waiting for activation. This makes the attack so despicable.

Changing the Autorun value in the registry detected by any.run

Step 3: Running PowerShell

After a system reboot, the registry script triggers PowerShell and downloads the VBS file from the remote server.

Within the any.run sandbox, this process appears on the right side of the screen. Click PowerShell.exe to find the downloaded file name.

Download the VBS file in a secure environment

At this stage there is no obvious malware. Just a script that gets what looks like a harmless file. However, the actual threat is hidden within the next step. In this step, you use steganography to hide the payload in the image.

Step 4: Activating steganography

Instead of downloading the executable, the VBS script retrieves the image file. However, what is hidden in the image is a malicious dll payload.

Images with malicious dll payload detected by any.run

With offset 000D3D80 inside any.run, you can determine where malicious DLLs are embedded in the image file.

Static analysis of malicious images

In static analysis, the image looks legal, but when you inspect 160 tabs and scroll down, you will see the <> flag.

Immediately after this flag is the “TVQ”, the base 64-encoded MZ signature of the executable. This has confirmed that steganography is used to hide the Xworm payload in the image and can bypass security detection until extracted and executed.

Step 5: XWORM is deployed in the system

The final step of the attack involves running the extracted DLL and injecting XWORM into the AddInProcess32 system process.

Detected in xworm malware any.run sandbox

At this point, the attacker will gain remote access to the infected machine and allow:

Commands that run commands that steal sensitive data use additional malware to use infected systems as a starting point for further attacks

Uncover hidden threats before they hit

Steganography-based attacks are an increasing challenge for businesses, as traditional security tools often overlook hidden malware in images and other media files. This allows cybercriminals to bypass detection without triggering alarms, steal data and infiltrate the infiltrating system.

Tools like any.run’s interactive sandbox allow security teams to visually track every stage of an attack, discover hidden payloads, and analyze suspicious files in real time.

Save time with fast threat analysis: Get initial results in just 10 seconds and streamline your threat assessment process. Collaborate efficiently: instantly share results and collaborate in real-time sessions to accelerate team tasks. Simplify your research: Use Any.run’s intuitive interface and real-time flags to reduce workloads and increase productivity. Get actionable insights: leverage extracted IOCs and MITRET & CK mapping for effective triage, response and threat hunting. Enhanced response: Improve data transfer from SoC Tier 1 to SoC Tier 2 with comprehensive reports for more effective escalation.

Proactively monitoring suspicious activity and testing potential threats in a controlled environment is key to strengthening your cybersecurity attitude.

Try any.run’s advanced features to get deeper visibility into threats and make faster, data-driven decisions to protect your business.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe UK space industry has secured records of ESA funding
Next Article Canada and Quebec commit $100 million for nature conservation
user
  • Website

Related Posts

Google pays $1.375 billion to Texas for fraudulent tracking and collection of biometric data

May 10, 2025

Germany shuts down more than $1.9 billion in laundry, seizing 34 million euros and 8TB of data using crypto

May 10, 2025

Breaking: EOL system dismantled in the US using 7,000 device proxy botnet IoT

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Non-scholar athletes argue that the lawsuit has not progressed well enough to amend the lighting rules on the list.

Amazon is peering into the new work of humans in the world of AI bots

Iran enriched nuclear “unnegotiable” before we talk in Oman | Nuclear News

Trump offers to cooperate with India, Pakistan in Kashmir ‘solution’ | India and Pakistan tension news

Trending Posts

Iran enriched nuclear “unnegotiable” before we talk in Oman | Nuclear News

May 11, 2025

Trump offers to cooperate with India, Pakistan in Kashmir ‘solution’ | India and Pakistan tension news

May 11, 2025

Heavy rain causes flooding in Mogadishu, Somalia, killing 7 people | Floods News

May 11, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Former Northvolt CEO Peter Carlson secures funding for the company’s new AI manufacturing startup after bankruptcy

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.