Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Steganography in Images: A New Cybersecurity Threat

Steganography in Images: A New Cybersecurity Threat

Posted on February 24, 2026 By CWS

Emerging Threat of Steganography in Cyber Attacks

In a recent discovery, cybersecurity experts have uncovered a new technique where hackers use steganographic methods within images to deploy malware. The malicious NPM package, named buildrunner-dev, conceals .NET malware in PNG images, allowing it to bypass antivirus scans and install a Remote Access Trojan (RAT) on Windows systems.

This campaign, identified in February 2026, highlights a significant evolution in supply chain attacks. The malicious code remains hidden within what appears to be benign image files, representing a growing challenge for security measures.

Malware Delivery Through Image Concealment

The buildrunner-dev package exploits a tactic known as typosquatting, mimicking legitimate NPM packages like buildrunner and build-runner, which have been abandoned by their creators. Unsuspecting developers could easily download this harmful version, mistaking it for an updated package.

Upon installation via npm install, a postinstall script initiates a file named init.js, which downloads a batch file from a Codeberg repository. This file embeds itself in the Windows Startup folder to ensure it runs with every system boot.

Analyzing the Attack Mechanism

Veracode researchers, after dissecting the batch file through multiple layers of obfuscation, revealed that the file predominantly consisted of deceptive elements designed to mislead both static analysis tools and human reviewers.

Before executing its payload, the malware checks for administrative rights, employing the fodhelper.exe UAC bypass to elevate privileges without raising alerts. It then launches a hidden PowerShell session, evaluates installed antivirus software, and adapts its infection strategy accordingly.

Steganographic Techniques in Action

Two PNG images hosted on ImgBB were found to carry the malicious payloads. One image, appearing as random visual noise, concealed an AMSI bypass PowerShell script, while another encoded a .NET loader. A third image served as a communication channel, delivering the Pulsar RAT payload when required.

By embedding malware into the RGB pixel values of these images, attackers effectively circumvented standard security scans, posing a substantial risk to unprotected systems.

Preventive Measures and Recommendations

Security professionals are advised to thoroughly audit NPM packages before installation, disable automatic execution of postinstall scripts, and monitor for unusual PowerShell activity. Observing UAC bypass attempts and unexpected connections to image hosting sites can help detect similar threats early.

As cyber threats continue to evolve, staying informed and vigilant is crucial for protecting systems against such sophisticated attacks.

Cyber Security News Tags:Antivirus, Cybersecurity, Malware, npm package, PowerShell, process hollowing, remote access trojan, Steganography, supply chain attack, UAC bypass

Post navigation

Previous Post: Arkanix Stealer Malware Ceases Operations Quickly
Next Post: Timothy Youngblood’s Journey: From CISO to Angel Investor

Related Posts

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely Cyber Security News
Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News
New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News
DSPM vs. DLP : Understanding the Key Differences DSPM vs. DLP : Understanding the Key Differences Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News