Demo: How Instegogram Uses Instagram & Image Steganography for C2 Attacks πŸ”

Discover how cyber adversaries exploit Instagram by hiding command-and-control data within images using steganography. Learn the techniques behind this covert communication method and its implications for security.

Demo: How Instegogram Uses Instagram & Image Steganography for C2 Attacks πŸ”
Endgame, Inc.
1.4K views β€’ Aug 8, 2016
Demo: How Instegogram Uses Instagram & Image Steganography for C2 Attacks πŸ”

About this video

Exploiting social media sites for command-and-control (C2) has been growing in popularity in the past few years. But both Good and Bad guys have privacy concerns about their communication methods. Discoverable encryption may not always be the answer. By using image steganography we hide command-and-control messages in plain sight within digital images posted to the social media site Instagram. In this presentation, we will demo Instegogram as well as discuss how to detect and prevent it.

Speaker Bio(s):
Amanda absolutely loves malware. She works as a Malware Researcher at Endgame who focuses on dynamic behavior detection both on Windows and OSX platforms.

Hyrum Anderson is a data scientist at Endgame who researches problems in adversarial machine learning and deploys solutions for large scale malware classification. He received a PhD in signal processing and machine learning from the University of Washington.

Daniel Grant is a data scientist at Endgame focusing on behavioral analysis and anomaly detection. He received a MS in Operations Research from Georgia Tech and likes building things that find bad guys when they are being sneaky.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.4K

Likes

20

Duration

2:58

Published

Aug 8, 2016

User Reviews

4.4
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.