How OceanLotus Uses Steganography to Hide Sophisticated Payloads πŸ•΅οΈβ€β™‚οΈ

Discover how Blackberry Cylance researchers reveal OceanLotus's advanced steganography techniques for payload obfuscation, highlighting new cybersecurity challenges.

How OceanLotus Uses Steganography to Hide Sophisticated Payloads πŸ•΅οΈβ€β™‚οΈ
N2K Networks
113 views β€’ May 11, 2019
How OceanLotus Uses Steganography to Hide Sophisticated Payloads πŸ•΅οΈβ€β™‚οΈ

About this video

Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files. Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.

The original research can be found here: https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html

The CyberWire's Research Saturday is presented by Juniper Networks.

Thanks to our sponsor Enveil, closing the last gap in data security.

Video Information

Views

113

Likes

3

Duration

17:32

Published

May 11, 2019

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.