Malvertising Attack Sneaks JavaScript Payload in Polyglot Images
#1
Exclamation 
Quote:A new malvertising attack observed in the wild relies on a less used technique to hide the malicious payload. The authors turned to polyglot images to add the JavaScript code that redirects to a page offering a fake reward.

The malicious code is hidden in a BMP type of picture and it is heavily obfuscated. One property of polyglot images is that browsers can run only the code inside them and ignore the rest of the content.

Basically, the interpreter in the browser ignores the image data and runs the payload string.

Researchers at Devcon discovered this trick used in the wild, disguised as a normal BMP file. One of the images altered to serve the attacker's interests can easily pass as a harmless advertisement:

[Image: Polyglot_image-Exploited.png]

SOURCE: https://www.bleepingcomputer.com/news/se...ot-images/
[-] The following 2 users say Thank You to silversurfer for this post:
  • darktwilight, harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Webroot SecureAnywhere 9.0.44.46
Webroot SecureAnyw...harlan4096 — 07:57
Free Download Manager 6.34.0.6878
Changes in 6.34.0....harlan4096 — 07:56
Kaspersky\VPN\KSOS 21.26 (MR26) & KES 1...
harlan4096 — 07:54
VMware Workstation Pro 26H1
VMware Workstation...harlan4096 — 07:53
Opera 131.0.5877.55
Hello! New upda...harlan4096 — 07:51

[-]
Birthdays
Today's Birthdays
avatar (44)knigiJow
avatar (46)1stOnecal
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (39)axuben
avatar (40)ihijudu
avatar (49)contjrat
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>