Ugly Hedgehog - Photography Forum
Home Active Topics Newest Pictures Search Login Register
Main Photography Discussion
Images can contain malware
Page <prev 2 of 2
Nov 24, 2021 09:03:32   #
johngault007 Loc: Florida Panhandle
 
Longshadow wrote:
But I didn't see where it states how the code in an image gets executed.
What causes the code to run?


LS,
That is the magic of this exploit. The jpg exif strings do not contain any executable code, but relies on a compromised web server where the "image" is hosted. That php string (obfuscated or not) will then utilize the infrastructure the attacker has been on the compromised host to initiate a remote connection.

Reply
Nov 24, 2021 09:10:16   #
Longshadow Loc: Audubon, PA, United States
 
johngault007 wrote:
LS,
That is the magic of this exploit. The jpg exif strings do not contain any executable code, but relies on a compromised web server where the "image" is hosted. That php string (obfuscated or not) will then utilize the infrastructure the attacker has been on the compromised host to initiate a remote connection.

Thanks.

(Some nasty people out there...)

Reply
Nov 24, 2021 09:51:20   #
JD750 Loc: SoCal
 
johngault007 wrote:
LS,
That is the magic of this exploit. The jpg exif strings do not contain any executable code, but relies on a compromised web server where the "image" is hosted. That php string (obfuscated or not) will then utilize the infrastructure the attacker has been on the compromised host to initiate a remote connection.


What is meant by “compromised” ?

Reply
 
 
Nov 24, 2021 09:59:05   #
johngault007 Loc: Florida Panhandle
 
JD750 wrote:
What is meant by “compromised” ?


Any computer or resource that has been negatively impacted either intentionally or unintentionally by an untrusted source.

It can impact one or all of the CIA triad (confidentiality, integrity, availability).

Reply
Nov 24, 2021 11:19:01   #
JeffDavidson Loc: Originally Detroit Now Los Angeles
 
Thanks!

Reply
Nov 24, 2021 12:15:38   #
rook2c4 Loc: Philadelphia, PA USA
 
Longshadow wrote:
But I didn't see where it states how the code in an image gets executed.
What causes the code to run?


The only way I can imagine this to happen is if the computer already has malware which continuously looks for that specific jpeg file on the hard drive and when found, then triggers it to execute.

Reply
Nov 24, 2021 12:29:59   #
johngault007 Loc: Florida Panhandle
 
rook2c4 wrote:
The only way I can imagine this to happen is if the computer already has malware which continuously looks for that specific jpeg file on the hard drive and when found, then triggers it to execute.



If there is already malware on the computer, why does it need another file to trigger more malware?

It was described above, someone posted a link.

Reply
 
 
Nov 24, 2021 16:31:15   #
rook2c4 Loc: Philadelphia, PA USA
 
johngault007 wrote:
If there is already malware on the computer, why does it need another file to trigger more malware?


So that both the malware file already on the computer as well as the modified image file are less likely to be recognized by anti-virus/malware protection software as a threat. Malware today is far more sophisticated than say, 20 years ago - specifically written to outsmart protection software by appearing as harmless individual files. Such as a normal jpeg file, or a file that looks for other files. Both types which are plentiful on any computer.

Reply
Nov 24, 2021 16:43:12   #
johngault007 Loc: Florida Panhandle
 
rook2c4 wrote:
So that both the malware file already on the computer as well as the modified image file are less likely to be recognized by anti-virus/malware protection software as a threat. Malware today is far more sophisticated than say, 20 years ago - specifically written to outsmart protection software by appearing as harmless individual files. Such as a normal jpeg file, or a file that looks for other files. Both types which are plentiful on any computer.


But if malware is already on the host, there is no need to "double down" and add more. That is just twice the likelihood of being detected. In this instance the jpg does not "contain" malware, just a set of instructions to start a process to either initiate a remote session or deliver a payload the malware on the targeted host. The JPG is never in fact needed to download, since it is viewed in a browser and executed server side.

Yes, malware is very sophisticated. One of the most recent malware/ransomware out there uses a word macro which is enabled by a user when they open an email attachment. That macro downloads a dll file which is side-loaded using a signed executable that is loaded on the system by default. There is no need to download additional malware to do anything, because the ransomware is already running and the system is compromised.

Reply
Page <prev 2 of 2
If you want to reply, then register here. Registration is free and your account is created instantly, so you can post right away.
Main Photography Discussion
UglyHedgehog.com - Forum
Copyright 2011-2024 Ugly Hedgehog, Inc.