EXPLORE
← Back to Explore
T1027.003

Steganography

Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files. [Duqu](https://attack.mitre.org/software/S0038) was an early example of malware that used steganography. It encrypted the gathered information from a victim's system and hid it within an image before exfiltrating the image to a C2 server.(Citation: Wikipedia Duqu) By t...

LinuxmacOSWindows
5
Detections
1
Sources
8
Threat Actors

BY SOURCE

5sigma

PROCEDURES (2)

General Monitoring4 detections

Auto-extracted: 4 detections for general monitoring

Process Creation Monitoring1 detections

Auto-extracted: 1 detections for process creation monitoring

DETECTIONS (5)