SUNBURST Malware Used Digital Steganography

credit: avatara
The MITRE ATT&CK Framework definition of steganography; credit
The MITRE ATT&CK Framework examples of APTs that have integrated steganography into their malware; credit
C2 response embeds commands in XML GUIDs; credit: vulners.com

think bad, do good | cybersecurity & privacy engineering | keybase.io/d3structo

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store