Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

In Plain Sight: How Cyber Criminals Exfiltrate Data Via Video
Dark Reading ^ | 10-17-2014 | Kaushik Narayan

Posted on 10/20/2014 5:45:33 AM PDT by Citizen Zed

In this attack, once hackers gained access to sensitive data stored by the company on the network, they split the data into compressed files of identical sizes, similar to how the RAR archive format transforms a single large archive into several smaller segments. Next, they encrypted this data and wrapped each compressed file with a video file. In doing so, they made the original data unreadable and further obscured it by hiding it inside a video file, a file format where it's not unusual to see multi-gigabyte file sizes. The video files containing stolen data played normally. What was unusual is that each file was an identical size, which is anomalous since encoded videos are usually not the exact same file size.

(Excerpt) Read more at darkreading.com ...


TOPICS: Chit/Chat
KEYWORDS:

1 posted on 10/20/2014 5:45:33 AM PDT by Citizen Zed
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

/mark


2 posted on 10/20/2014 5:51:23 AM PDT by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Citizen Zed; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; ...

3 posted on 10/20/2014 5:57:41 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Citizen Zed

does this mean I can’t torrent tv shows now?


4 posted on 10/20/2014 7:11:59 AM PDT by expat_panama
[ Post Reply | Private Reply | To 1 | View Replies]

To: Citizen Zed
Only step one is an attack and it's the only real technological hurdle. People have been hiding data streams in video for quite some time.

This article is like describing a bank robbery by how the criminals laundered the money.

5 posted on 10/20/2014 7:17:10 AM PDT by Durus (You can avoid reality, but you cannot avoid the consequences of avoiding reality. Ayn Rand)
[ Post Reply | Private Reply | To 1 | View Replies]

To: expat_panama; All

If you work in ITSEC for a corporation, do egress filtering and logging on all video and compression formats.

I’m available for consulting. :-)


6 posted on 10/20/2014 7:50:59 AM PDT by gura (If Allah is so great, why does he need fat sexually confused fanboys to do his dirty work? -iowahawk)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Durus

Well said. Which tools do you need to perform these attacks even if the box is compromised?


7 posted on 10/20/2014 7:52:44 AM PDT by gura (If Allah is so great, why does he need fat sexually confused fanboys to do his dirty work? -iowahawk)
[ Post Reply | Private Reply | To 5 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson