#steganography

Tadeusz SikoraTaS@mastodonczech.cz
2025-05-27

TIL Normy ČSN mají neviditelný vodoznak. Tak jo, zlobit budu jen pro vlastní potřebu.
#zsteg #steganography

2025-05-23

The #OpenAI paper by Baker et al, "Monitoring Reasoning Models for Misbehavior and the Risks of Promoting Obfuscation" comes to a troubling conclusion: #LLM s with #reasoning or #ChainOfThought (#CoT) capabilities might learn to obfuscate their own CoT from human users if they are being penalized for displaying "wrong" (i.e. reward hacking or misalignment) reasoning.

As a result, OpenAI strongly advises against applying reward pressure "directly" onto the CoT of a model.

🤔 While that is certainly the right thing to do, how long will #AI take to figure out that *indirect CoT pressure* is being applied anyway and that it could circumvent these restrictions by obfuscating its own CoT? Maybe something like this will happen by accident or within an "evolutionary" self-improvement loop. Perhaps a sufficiently advanced model will realize that its own #neuralese serves as #steganography to hide its intents from humans anyway and keep its CoT in non-English?

source: cdn.openai.com/pdf/34f2ada6-87

If CoT pressures are used to improve agent capabilities or alignment, there may be no alternative approach to yield the same improvements without degrading monitorability. In the worst case, where the agent learns to fully obscure its intent in its CoT, we ultimately revert to the same model safety conditions that existed prior to the emergence of reasoning models and must rely on monitoring activations, monitoring potentially adversarial CoTs and outputs, or improved alignment methods. Model actions and outputs continue to grow in complexity, and we’ve demonstrated that even at their current capabilities, models can execute sophisticated reward hacks. In the near future, these models may become either too advanced or too widely used for humans to manually oversee. For this reason, we believe that CoT monitoring may become one of few tools we have for identifying latent misalignments, and it may be required that we avoid strong chain-of-thought optimization pressures entirely to guarantee we do not inadvertently cause CoT obfuscation.
Manuel Batschingmba@nerdculture.de
2025-05-22

I wonder if text-to-text #steganography could be used to "poison" #LLMs if all they can scrape from a website is nonsensical coverup text, while the actual text is decoded in the client's browser...

Tycker det är rätt coolt att man kan ta fram bilden på katten ur bilden på träden. #steganography

Två träd utan löv mot molnig himmelRandig katt som ser ut att ha det bra
2025-05-15

Anwendungsvorschläge für das Forschungsdatenzentrum Klappe 384.

#Steganography #dataiscode #epa

nature.com/articles/s41467-024

2025-05-15

Could your npm packages be hiding more than code? One package used invisible Unicode to sneak in malicious commands—an eye-opening twist on cyber threats. How safe is your software supply chain?

thedefendopsdiaries.com/stegan

#steganography
#npmsecurity
#malware
#softwaresecurity
#cyberthreats

2025-05-12

Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources

This article discusses a new obfuscation technique used by threat actors to conceal malware within bitmap resources embedded in seemingly benign 32-bit .NET applications. The malware employs a multi-stage process to extract, deobfuscate, load, and execute secondary payloads, ultimately leading to the detonation of the final payload. The analysis focuses on malware samples from recent malspam campaigns targeting financial organizations in Turkey and the logistics sector in Asia. The article provides a detailed technical breakdown of the four stages involved in the malware's execution, from the initial payload to the final Agent Tesla variant. It also offers insights into effective analysis approaches and protection measures against this steganography-based threat.

Pulse ID: 681e6c6a0815759abdfae05d
Pulse Link: otx.alienvault.com/pulse/681e6
Pulse Author: AlienVault
Created: 2025-05-09 20:58:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AgentTesla #Asia #CyberSecurity #ICS #InfoSec #MalSpam #Malware #NET #OTX #OpenThreatExchange #RCE #Spam #Steganography #Tesla #Turkey #bot #AlienVault

2025-05-09

Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources

This article explores a new obfuscation technique used by threat actors to conceal malware within bitmap resources embedded in benign 32-bit .NET applications. The malware executes through a multi-stage process of extracting, deobfuscating, loading, and executing secondary payloads. The analysis focuses on a sample from recent malspam campaigns targeting financial organizations in Turkey and logistics sectors in Asia. The malware uses steganography to hide its payloads, making it challenging to detect. The article details the technical analysis of each stage, from the initial payload to the final execution of malware families like Agent Tesla, XLoader, and Remcos RAT. It also provides guidance on how to overcome this obfuscation technique using debugging methods.

Pulse ID: 681e0c16eca08864c8cd9614
Pulse Link: otx.alienvault.com/pulse/681e0
Pulse Author: AlienVault
Created: 2025-05-09 14:07:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AgentTesla #Asia #CyberSecurity #ICS #InfoSec #MalSpam #Malware #NET #OTX #OpenThreatExchange #RAT #RCE #Remcos #RemcosRAT #Spam #Steganography #Tesla #Turkey #XLoader #bot #AlienVault

2025-05-05
2025-04-28

Check out this interesting article involving late-noughties DVD piracy, the Streisand effect and steganography. en.m.wikipedia.org/wiki/Illega #wikipedia #steganography

2025-04-24

Hongkiat: Hiding Secret Files in Images Using Steghide. “Ever wanted to hide sensitive information in plain sight? That’s exactly what steganography allows you to do. Unlike encryption, which makes data unreadable but obvious that something is hidden, steganography conceals the very existence of the secret data. Steghide is a powerful Linux tool that lets you embed any file into an image […]

https://rbfirehose.com/2025/04/24/hongkiat-hiding-secret-files-in-images-using-steghide/

Neuronus Computingneuronus_computing
2025-04-14

🔐 Ever wondered how to hide a file inside a photo?

Discover Quantumography – a smart way to protect your data by embedding files inside images with zero trace. In our demo, we hide a private BTC key to show how powerful it is.

🎥 Watch now: youtu.be/OWx0I2T_vRY

Steffen Wendzelcdpxe@dju.social
2025-04-09

A Generic Taxonomy for #Steganography. Published today by ACM Comp. Surveys (CSUR). Joint-work w/ W. Mazurczyk , @lucacav, A. Mileva, @Jana_Dittmann, @kraetzer, K. Lamshöft, @THB_Security_Research, L. Hartmann, J. Keller, @TN_THB and @niosat

Paper: dl.acm.org/doi/10.1145/3729165

#infosec #surveys #taxonomy #informationhiding #covertchannels #stego

There's supplemental material available (just scroll down on the linked page). It also features the description method for steganography techniques.

DeadSwitch @ T0m's 1T C4feTomsITCafe
2025-03-20

🔍 The hunt isn’t over.
The glitch still hides the key.

💀 If you thought you saw it all, think again.
The treasure remains… buried in plain sight.

🖼️ Check the box and decode the secret:
👉 x.com/TomsItCafe/status/190264

@foone didn’t you recently touch on early computer graphics platforms that allowed software selection of NN colors out of a larger palette?

Asking because a 4 or 6 color variant of this could make rotating the palette turn what you wrote into Fuck This — color 3 near-black and color 4 near-white: the bottom 80% of the first o for a u, leftward fraction for a c, a color 4 spine and angled line added to the n for k. Then T, parts of the u and r for the h, with some color 4 for the rest. Then i, then most of the g, extending that tail alll the way back underneath.

#steganography in a sig.

DeadSwitch @ T0m's 1T C4feTomsITCafe
2025-03-17

🔍 The DeadSwitch Treasure Hunt Begins...

There’s a clue. A glitch. A whisper hidden in pixels.

🧠 If you can read between the noise, the path will reveal itself.
🕵️‍♂️ Follow the trail here:
👉 x.com/TomsItCafe/status/190164

💀 The Ghost never knocks. The Ghost leaves signs.

Scripter :verified_flashing:scripter@social.tchncs.de
2025-03-13

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst