Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Steganography in Images: A New Cybersecurity Threat

Steganography in Images: A New Cybersecurity Threat

Posted on February 24, 2026 By CWS

Emerging Threat of Steganography in Cyber Attacks

In a recent discovery, cybersecurity experts have uncovered a new technique where hackers use steganographic methods within images to deploy malware. The malicious NPM package, named buildrunner-dev, conceals .NET malware in PNG images, allowing it to bypass antivirus scans and install a Remote Access Trojan (RAT) on Windows systems.

This campaign, identified in February 2026, highlights a significant evolution in supply chain attacks. The malicious code remains hidden within what appears to be benign image files, representing a growing challenge for security measures.

Malware Delivery Through Image Concealment

The buildrunner-dev package exploits a tactic known as typosquatting, mimicking legitimate NPM packages like buildrunner and build-runner, which have been abandoned by their creators. Unsuspecting developers could easily download this harmful version, mistaking it for an updated package.

Upon installation via npm install, a postinstall script initiates a file named init.js, which downloads a batch file from a Codeberg repository. This file embeds itself in the Windows Startup folder to ensure it runs with every system boot.

Analyzing the Attack Mechanism

Veracode researchers, after dissecting the batch file through multiple layers of obfuscation, revealed that the file predominantly consisted of deceptive elements designed to mislead both static analysis tools and human reviewers.

Before executing its payload, the malware checks for administrative rights, employing the fodhelper.exe UAC bypass to elevate privileges without raising alerts. It then launches a hidden PowerShell session, evaluates installed antivirus software, and adapts its infection strategy accordingly.

Steganographic Techniques in Action

Two PNG images hosted on ImgBB were found to carry the malicious payloads. One image, appearing as random visual noise, concealed an AMSI bypass PowerShell script, while another encoded a .NET loader. A third image served as a communication channel, delivering the Pulsar RAT payload when required.

By embedding malware into the RGB pixel values of these images, attackers effectively circumvented standard security scans, posing a substantial risk to unprotected systems.

Preventive Measures and Recommendations

Security professionals are advised to thoroughly audit NPM packages before installation, disable automatic execution of postinstall scripts, and monitor for unusual PowerShell activity. Observing UAC bypass attempts and unexpected connections to image hosting sites can help detect similar threats early.

As cyber threats continue to evolve, staying informed and vigilant is crucial for protecting systems against such sophisticated attacks.

Cyber Security News Tags:Antivirus, Cybersecurity, Malware, npm package, PowerShell, process hollowing, remote access trojan, Steganography, supply chain attack, UAC bypass

Post navigation

Previous Post: Arkanix Stealer Malware Ceases Operations Quickly
Next Post: Timothy Youngblood’s Journey: From CISO to Angel Investor

Related Posts

Iranian Hackers Breach FBI Director’s Email Iranian Hackers Breach FBI Director’s Email Cyber Security News
Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Cyber Security News
Best Network Security Solutions for CSO Best Network Security Solutions for CSO Cyber Security News
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Cyber Security News
Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments Cyber Security News
Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Espionage Campaign Uses Fake Messaging Apps to Spread Spyware
  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Espionage Campaign Uses Fake Messaging Apps to Spread Spyware
  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark