Just look at a image and you are HACKED!

0
0

0
0
1

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.

Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.

Stegosploit

Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit. A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time.

Shah demonstrated the technique during a talk titled, “Stegosploit: Hacking With Pictures,” he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, “a good exploit is one that is delivered in style.”

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here’s How to Hack digital pictures to send malicious exploits:

Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it’s true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Porn and much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The “Secret Sauce” behind Stegosploit — this is what Shah calls it.

“I don’t need to host a blog,” Shah told Motherboard, “I don’t need to host a website at all. I don’t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate.”
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.

  • RODRIGO CESAR BANHARA

    On Windows I use IrfanView. It is secure. =) On Android I do not use images. I barely use Android.