6 years ago (yikes!) I wrote about image steganography as a concept. At the moment there are a couple of pieces of malware that use steganography, such as Vawtrak (aka Neverquest) and ZeuS, to hide the command and control servers (C&C) or configuration files in images. This means that the malware does not need to contain a static list of C&Cs which will become old quickly, but can just download an innocent looking image from the internet; decode the hidden message and then connect out. The advantages are that the image can be refreshed with C&C data without having to recompile the malware; and the images can be hidden in plain sight; e.g. on legitimate message boards.
alternate data streams St Nicholas gardening qualitative Shellbags retro fabrics Turkey Mosaic papier mache make your own AJAX programming England greeting walks law cyber threat models Michelin restaurant Dean Village recycle bin crafts Irari rules canvas Facebook chat blood art history Kilimanjaro Firebug presents reference management public lecture altitude sickness exhibition criminology Derren Brown cloud intelligence Belgium board games readability magnets draught excluder compSIA. Security+ Skye Number One Barcelona Strathclyde Fort William masters Barranco camp Edinburgh Fringe The Balmoral Amazon bacon cards lectures sophisticated cyber attack Michelin star Pixel