Steganography enables sophisticated OceanLotus payloads. [Research Saturday]

Published: May 11, 2019, 5 a.m.

Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.\n\nTom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.\nThe original research can be found here:\n https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html\nLearn more about your ad choices. Visit megaphone.fm/adchoices