Hackers Use Images to Distribute Malware in Phishing Attacks
/ 1 min read
🖼️💻 Hackers Conceal Malware in Images to Launch Sophisticated Attacks. Threat actors are using images to hide malicious code and deliver malware like VIP Keylogger and 0bj3ctivity Stealer through phishing campaigns. These attacks begin with deceptive emails that trick recipients into opening infected attachments, exploiting a known security flaw to download a PowerShell script. This script retrieves an image from archive.org, decodes it, and executes a .NET loader to install the malware. HP Wolf Security’s report highlights the increasing use of GenAI in crafting these attacks, making them more efficient and accessible to less skilled cybercriminals. The commodification of cybercrime is evident as malware kits become easier to obtain and use, posing a growing threat to cybersecurity.
