Friday, March 31, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Coverage Advisory for 3CX Supply Chain Attack
  • Red flags flew over software supply chain-compromised 3CX update
  • Digital Skimming Attacks Skyrocket
  • Case Study: Large Financial Institution
  • USENIX Security '22 - Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen - ‘Stick It To The Man: Correcting For Non-Cooperative Behavior Of Subjects in Experiments on Social Networks’
Malware SBN News Security Bloggers Network 

Home » Cybersecurity » Malware » Malvertising Campaign Used Steganography to Distribute Shlayer Trojan

SBN

Malvertising Campaign Used Steganography to Distribute Shlayer Trojan

by David Bisson on January 24, 2019

A short-lived malvertising campaign leveraged a steganography-based payload to target Mac users with the Shlayer trojan.

TechStrong Con 2023Sponsorships Available

Named for its use of veryield-malyst[dot]com as one of its ad-serving domains, the “VeryMal” threat actor conducted its malvertising campaign between 11 January 2019 and 13 January 2019. That’s not a long time period to remain active. But the campaign boosted its visibility by affecting two top-tier exchanges that account for approximately a quarter of the top 100 publisher sites.

Anti-malware software provider Confiant believes that this technique helped the malvertising operation generate as many as five million impressions each day it was active.

Infection began when a Mac user came across an ad containing the image of a small white bar.

The image file observed by Confiant.

This file might look unremarkable. But that wasn’t the case below the surface. That’s because VeryMal had created a Canvas object, which enabled the HTML5 Canvas API to interact with images and their underlying data.

Via the use steganography, the image file contained code that enabled it to check if the user’s machine supported Apple fonts. If it didn’t, the program terminated. If it did, it looped through the file’s underlying data and in so doing built code necessary for redirecting the victim.

At that point, the user landed on a web page warning them that their Adobe Flash Player software was out-of-date. It then deployed a fake Flash update named “AdobeFlashPlayerInstaller.iso.” This binary, as analyzed by Adam Thomas at Malwarebytes, turned out to be the Shlayer trojan, malware which is known for masquerading as fake Flash updates in order to infect unsuspecting Mac users.

Eliya Stein, who does security engineering and research at Confiant, says this campaign illustrates malvertising actors’ drive to evade detection mechanisms:

As malvertising detection continues to mature, sophisticated attackers (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/malvertising-campaign-used-steganography-to-distribute-shlayer-trojan/

January 24, 2019January 24, 2019 David Bisson Cyber Security, Latest Security News, malvertising, Malware, steganography
  • ← Cross Site Cookie Manipulation
  • China blocks Microsoft’s Bing search engine →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks
Should You Have Security Concerns When Partnering With a Third Party?
Business Email Compromise Threats Soar Past Phishing Risks
AI/ML’s Role in Software Supply Chain Security
Survey Surfaces Need to Change SecOps Priorities
USENIX Security ’22 – ‘QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore’
🧪 Lit + WebR + Observable Plot: Linking Lit’s Lightweight Web Components And WebR For Vanilla JS Reactivity & JS DataVis
Privacy Compliance In 2023
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
SANS First Look Report: Self-Supervised Learning Cybersecurity Platform for Threat Detection

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 20

Lessons From a Live Hack: Secure Your Cloud From the Inside

April 20 @ 3:00 pm - 4:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | Mar 17 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites

March 30, 2023 Richi Jennings | Yesterday 0
Spera Unveils Platform for Finding and Tracking Identities
Cybersecurity Featured Identity & Access Network Security News Security Boulevard (Original) Spotlight 

Spera Unveils Platform for Finding and Tracking Identities

March 29, 2023 Michael Vizard | 1 day ago 0
Skyhawk Security Taps ChatGPT to Augment Threat Detection
Cloud Security Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Skyhawk Security Taps ChatGPT to Augment Threat Detection

March 29, 2023 Michael Vizard | 1 day ago 0

Security Humor

Randall Munroe’s XKCD ‘Qualifications’

Randall Munroe’s XKCD ‘Qualifications’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.