OilRig Hides C2 Configuration in Google Drive Image Using LSB Steganography

A well-known Iranian state-sponsored hacking group called OilRig, also tracked as APT34 and Helix Kitten, has been found hiding its command-and-control (C2) server configuration inside a regular-looking image file stored on Google Drive. The threat group used a technique called LSB (Least Significant Bit) steganography to quietly embed encrypted data into a PNG image, making […]

The post OilRig Hides C2 Configuration in Google Drive Image Using LSB Steganography appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: