Automatically translated.View original post

Hackers use coded camouflage methods, hiding malware in PNG photo files

Hackers were found using coded camouflage methods, hiding malware codes inside PNG image files to release malware.

Hiding malware or payload can be done in a variety of ways, from complex hiding through redirecting, URLs, reliable use of digital archives or Repo. And the most likely way to be up and coming is to hide the code in harmless files, such as image files, etc.

According to a report by the website, Cyber Security News has mentioned the detection of an NPM package, a JavaScript package that hides malware for remote access to the victim's system, or a RAT (Remote Access Trojan). NET is hiding payload code in a non-toxic PNG image file with a Steganography method. The package is impersonated as a buildrunner-dev package, named as buildrunner and build-runner. These two projects were long abandoned by the developer, but the name is similar enough to allow those searching for these two tools to misdownload.

The malware mechanism begins after the victim installs the tool from the package via npm install. The Hook that runs after installation like Postinstall Hook runs a script from the init.js file to download a Btach script file called packageloader.bat from Codeberg, a reliable Repo service. This file silently copies itself into the Windows Startup folder, which creates persistence on the system, or Persistence, guaranteeing that the malware will rework every time it is turned on or rebooted. New

Such a Batch file, in addition to having the ability to create Persistence, has also confused up to seven layers of Obfuscation with up to 1,653 lines of code, but only 21 lines of functional code. There are also disorganized comments, useless junk variables, fake Base64 string values to disrupt Static Analysis and human verification.

And before running the Payload code, the malware will check if it has the Admin or Administrator. If it does not find it, it will use fodhelper.exe to upgrade its permissions while evading the UAC Account Control system at one time, without UAC showing the user the Prompt to choose whether or not to grant it. After that, the malware will run the PowerShell code through conhost.exe to determine if there is an anti-virus or cyber protection tool installed on the system. At this point, there will be a method. That led to the installation of the last malware file in many ways as the analysis detected, which the source did not provide details.

The last payload is a RAT malware payload called Pulsar that, after installation, inserts itself into the Windows General Process, making it difficult to detect. This payload code is hidden inside the RGB (Red Green Blue) Pixel of two PNG image files deposited on the ImgBB website.

"6b8owksyv28w.png" (41 × 41 px, 2.3 KB) internally contains PowerShell-style code that can emanate AMSI-style protection (Antimalware Scan Interface).

"0zt4quciwxs2.png" (141 × 141 px, 67 KB) internally contains the code of the .NET extension malware (Loader) for use in releasing the real payload.

The two runs lead to downloading and decoding the code from another image file deposited at hxxps: / / i.ibb [.] co / tpyTL2Zg / s9rugowxbq8i.png. This third file acts as a control server (C2 or Command and Control) that will ultimately release Pulsar malware into the victim's machine.

# Trending # Lemon 8 Howtoo # lemon 8 diary # png # freedomhack

3/20 Edited to

... Read moreจากประสบการณ์ในการติดตามและวิเคราะห์ภัยคุกคามไซเบอร์ประเภทซ่อนโค้ดในไฟล์มีเดีย เช่น PNG ผมพบว่าการใช้ Steganography เป็นวิธีที่แฮกเกอร์นิยมมากขึ้น เพราะไฟล์รูปภาพแพร่หลายและดูเหมือนไม่เป็นภัย การซ่อนโค้ดในพิกเซล RGB ทำให้มัลแวร์สามารถเล็ดลอดผ่านระบบสแกนไวรัสทั่วไปได้ง่าย โดยเฉพาะเมื่อโค้ด PowerShell หรือ .NET Loader ที่ใช้ในมัลแวร์ RAT ได้ถูกเข้ารหัสหรือปรับแต่งให้สมบูรณ์แบบ เรื่องที่น่ากลัวคือเทคนิค Persistence ที่ใส่โค้ด Batch ลงในโฟลเดอร์ Windows Startup เพื่อให้มัลแวร์ทำงานทุกครั้งที่เริ่มระบบ ผมเคยเจอหลายกรณีที่โค้ดถูกทำ Obfuscation ซับซ้อนมาก ทำให้การวิเคราะห์ด้วยมือแทบจะเป็นไปไม่ได้ ต้องพึ่งพาเครื่องมือเฉพาะทางหรือ AI ช่วยวิเคราะห์ อีกทั้งฟีเจอร์เดียวที่น่าสนใจ คือ การขอสิทธิ์ Admin โดยใช้ fodhelper.exe ที่หลบเลี่ยง UAC Prompt ได้ ทำให้มัลแวร์ได้สิทธิ์สูงสุดโดยไม่แจ้งเตือนผู้ใช้ สำหรับผู้ใช้ทั่วไป ควรระวังการติดตั้งแพ็กเกจหรือซอฟต์แวร์จากแหล่งที่ไม่น่าเชื่อถือ และหมั่นอัพเดตแอนตี้ไวรัสรวมถึงใช้เครื่องมือความปลอดภัยที่สามารถตรวจจับพฤติกรรมแปลก ๆ ได้ นอกจากนี้ ควรระมัดระวังไฟล์รูปภาพหรือไฟล์อื่น ๆ ที่ได้จากแหล่งภายนอกโดยไม่ผ่านการตรวจสอบ เพราะอาจแฝงมัลแวร์หรือโค้ดอันตรายแบบนี้ได้ การเรียนรู้เทคนิค Steganography คร่าวๆ และเข้าใจถึงวิธีการที่แฮกเกอร์ใช้พรางโค้ด เป็นประโยชน์ในการป้องกันภัยคุกคามไซเบอร์ในยุคสมัยที่เทคโนโลยีก้าวหน้าเช่นนี้

Related posts

SIEGEX is all CHEATERS & HACKERS😭
Why is this game full of cheaters and hackers and bugs🤷‍♀️ #siege #rainbowsixsiege #gaming #streamer #foryou
Phasma

Phasma

29 likes

Do you like hackers?
#hacker #hackers #tricked #fyp
Lil Conscious

Lil Conscious

38 likes

Look world deactivated all my Instagram accounts cause I was at a 1000 friends to go go live and removing all my legal paperwork and complaints tampering with federal evidence Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and ha
glentrump359

glentrump359

0 likes

Look world deactivated all my Instagram accounts cause I was at a 1000 friends to go go live and removing all my legal paperwork and complaints tampering with federal evidence Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and ha
glentrump359

glentrump359

0 likes

A laptop with a cloudy sky wallpaper and a white cup with a red logo. Text overlay reads: 'Free Websites That Saved My GPA AND MY SANITY Sharing So You Don't Struggle Too'.
A laptop screen displays Yahoo search results for 'Quizlet'. An overlay describes Quizlet as a free flashcard tool for memorizing terms, definitions, and formulas, making studying feel like a game.
A laptop screen displays Yahoo search results for 'Unriddle.ai'. An overlay describes Unriddle.ai as a free tool that breaks down notes, articles, or assignments to aid understanding of long readings.
Websites You NEED to Pass Your College Courses
Y’all college is hard enough without trying to figure everything out on your own 😩 So here’s my list of websites that actually helped me pass my classes like, these were in my survival kit. I’m not gatekeeping 🫶🏽 Quizlet When I needed to memorize terms FAST. I used it for flashcards, and the matc
Beauty

Beauty

276 likes

Look world locking me out of all my Facebook accounts and deactivate all my Facebook accounts Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers everyday all day and night and morning the same lame games they been doing f
glentrump359

glentrump359

0 likes

PSA PSA PSA ‼️ #fyp #hackers #facebook #scammers #viral
Kay’s House ✨

Kay’s House ✨

2 likes

Most small businesses believe they’re too small to be hacked… but that’s not how cyber risk works. In today’s connected world, your business doesn’t stand alone. You rely on vendors, payroll systems, cloud platforms, CRMs, IT providers, to run your operations. But here’s the truth many people ov
Abby❤️💎

Abby❤️💎

0 likes

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

I wanted a real project I could actually show, not just talk about. So I used Atoms ⚛️ Check it out here: https://tinyurl.com/3xzc8xbe It feels like having a whole AI team helping me: 🔍 they do the deep research first 🏁 then Race Mode builds different versions so I can compare 👥 I just pick
emilie.studygram

emilie.studygram

19 likes

BIG Holiday Costco Shop & Haul | Anchorage, Alaska
vanditsv

vanditsv

2 likes

Look world deactivated all my Instagram accounts cause I was at a 1000 friends to go go live and removing all my legal paperwork and complaints tampering with federal evidence Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and ha
glentrump359

glentrump359

0 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

#yungblud
watch4hackers

watch4hackers

6 likes

scammers and hackers beware
Hudson
cercofhell

cercofhell

28 likes

The image shows a keyboard with a fingerprint icon, overlaid with "OUTSMART HACKERS" and "Secrets they don't want you to know," serving as the title for a guide on cybersecurity.
This image explains hackers use software to guess passwords and advises creating long passwords with a random mix of letters, numbers, and symbols to defend against such attacks.
The image warns that hackers try common passwords and advises users to defend themselves by avoiding easy words/phrases and not reusing passwords across different sites.
SECRETS Hackers DON’T Want You to Know!
After hackers got into my Facebook account and completely erased it, I dusted myself off and started a deep dive to understand why and how hackers work. The best way to protect yourself is to outsmart them. Here are 5 secrets Hackers DON'T want you to know! Share this with everyone! #lemon8pa
techgirljen

techgirljen

424 likes

Amen thanks Father God Jesus Christ God evening word and prayer devil's I rebuke you your childrens Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg and Randy Tappin and Christopher Thirdkill and IT and their countr
glentrump359

glentrump359

0 likes

Bigfoot Super Hackers.
#manthoughts #hackers #laughoutloud #bigfootvlog #lifetips
Alien Hayes

Alien Hayes

11 likes

Amen thanks Father God Jesus Christ God morning word and prayer devil's I rebuke you your childrens Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg and Randy Tappin and Christopher Thirdkill and IT and their countr
glentrump359

glentrump359

1 like

A message to Minecraft hackers…
You should join the server #minecraft #gaming #fyp
BendersMC

BendersMC

13 likes

Look world I just made this Instagram account right now Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just login me out of it showing favoritism and discriminate against Glen Nickolas Akins this is against my federal
glentrump359

glentrump359

0 likes

Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

WARZONE HACKERS
Warzone is full hackers and call of duty does not care #warzone #hacker #memesdaily #memes🤣 #gaming
DUSTINMYRQ ™

DUSTINMYRQ ™

3 likes

#stitch with @Steve-O’s Wild Ride! Podcast & @Drew On Spotify | what do you think? 🤔 I suggest checking out @The Hacking Games to support your kids! 💥 #videogames #onlinesafety #parentinghacks #momsoftiktokover30
Fareedah | Protect Kids Online

Fareedah | Protect Kids Online

5 likes

An Instagram account suspension notice for 'Mike Bad' indicates 180 days to appeal before permanent disablement. The suspension, effective April 16, 2026, is due to potential association with another rule-violating account, affecting account integrity. The account is currently not visible or usable.
Look world I just made this Instagram account right now Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just login me out of it showing favoritism and discriminate against Glen Nickolas Akins this is against my federal
glentrump359

glentrump359

0 likes

Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just locked and removed my lives for no reason cause I'm speaking my freedom of speech constitutional rights and laws FBI and state police DEA and governme
glentrump359

glentrump359

0 likes

Kalebdavis19

Kalebdavis19

1 like

Amen thanks Father God Jesus Christ God morning word and prayer devil's I rebuke you your childrens Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg and Randy Tappin and Christopher Thirdkill and IT and their countr
glentrump359

glentrump359

0 likes

#fyp #edit #movies #tvshow #filmclips
SSHT004

SSHT004

11 likes

Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just locked and removed my lives for no reason cause I'm speaking my freedom of speech constitutional rights and laws FBI and state police DEA and governme
glentrump359

glentrump359

0 likes

warzone hackers be mad little babies
#cod #ps5 #gamergirl #warzone #fuckhackers
Twilightvile

Twilightvile

2 likes

Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just locked and removed my lives for no reason cause I'm speaking my freedom of speech constitutional rights and laws FBI and state police DEA and governme
glentrump359

glentrump359

0 likes

Hackers
How call of duty has me #call of duty #hacker #warzone
Stevie_Wonders

Stevie_Wonders

1 like

⚠️ The Hidden Dangers of Public Wi-Fi Free Wi-Fi feels convenient, but it can be a trap. Hackers can create what’s called an “evil twin” network—a fake hotspot that looks legitimate. The moment you connect, they can access your data, passwords, banking info, and private messages. Listen
Dannah Eve

Dannah Eve

82 likes

Bubbas Tee

Bubbas Tee

0 likes

Hackers, AI and Cyberattacks
https://www.techradar.com/ai-platforms-assistants/if-hackers-can-use-ai-to-automate-massive-cyber-attacks-terminator-robots-are-the-least-of-our-problems #ai #hackers #cyberattacks #robots
angela1957

angela1957

2 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

A woman with dark hair and a light orange top smiles at the camera. The background features a wooden wall. Watermarks for Lemon8 and TikTok Lite with the username @angelawrivers are visible.
Hackers are using Google.com to deliver malware
Hackers are using Google.com to deliver malware by bypassing antivirus software and here is how to stay safe https://www.msn.com/en-us/news/technology/hackers-are-using-google-com-to-deliver-malware-by-bypassing-antivirus-software-here-s-how-to-stay-safe/ar-AA1GIDSi?ocid=sapphireappshare #hackers
angela1957

angela1957

0 likes

Replying to @Red what parts or the dark web live in your brain rent free? #scarystories #horror #eductional #darkweb
Liz Cooper🦋

Liz Cooper🦋

40 likes

just enough to make the stop count
the pricing was still about the same as my home town though
boxed.in.2026

boxed.in.2026

0 likes

Look world as soon I start going live on bingo app Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers lock my bingo live cause I'm listening to the word of God Jesus Christ God
glentrump359

glentrump359

0 likes

Hackers are using tricks & steal financial info.🌸🍋
SECURITY TIPS: Be careful from hackers they use multiple different types of software and tricks to steal data from computers, cell phones or other devices to steal your data, financial information and personal details. When they hack via computer systems Showing they are from Microsoft Security Ale
Mujahid Bakht

Mujahid Bakht

6 likes

Vibe coding is more accessible but it’s not as simple as speaking plain English😡
NO! Vibe coding is NOT as simple as people say! And if done poorly, you can get hacked 😒 45% of the apps built with AI could be vulnerable from day one. We’re talking about: 1. Hardcoded API keys 2. Missing authentication 3. Vulnerable dependencies These are common issues in AI generated c
Learn AI with Rosie Rachel

Learn AI with Rosie Rachel

0 likes

A phone screen displays eSIM settings, showing an active AT&T eSIM with a phone number, an option to add a new eSIM, and primary SIM settings.
The title of an article, 'What Can Someone Do With Your SIM Card? (How To Secure It)', published on February 8, 2024, with author details.
Text discussing the risks of a stolen SIM card, including an example of $68,000 stolen via a SIM swap, and noting the rise in SIM card attacks.
my physical sim card from my original AT&T smartphone has been stolen out of my Samsung Galaxy Fold7
Dougintime

Dougintime

4 likes

Just An FYI This Is How So Many People are Getting Hacked!!! Plz Don’t Fall For Message Like These!!! it’s A Fake Account!!! #fakeaccount #hackers
MaryBell

MaryBell

2 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

117 likes

See more