The Recycler
  • G&G Masthead Web banner Feb 2025
  • Katun Masthead Nov 2024
  • Biuromax Masthead web banner March 2024

Attackers sneaking malware into images on websites

January 16, 2025

HP Inc. issued its latest Threat Insights Report, highlighting how threat actors are using malware kits and generative artificial intelligence (GenAI) to improve the efficiency of their attacks.

Such tools are reducing the time and skill needed to create attack components, enabling attackers to focus on experimenting with techniques to bypass detection and trick victims into infecting their endpoints, such as embedding malicious code inside images.

The report provides an analysis of real-world cyberattacks, helping organisations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape. Based on data from millions of endpoints running HP Wolf Security, notable campaigns identified by HP threat researchers include:

  • Malware-by-numbers kits: HP threat researchers observed large campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware that leverage the same techniques and loaders, suggesting the use of malware kits to deliver different payloads. In both campaigns, attackers hid the same malicious code in images on file hosting websites like archive.org, as well as using the same loader to install the final payload. Such techniques help attackers circumvent detection, as image files appear benign when downloaded from well-known websites, bypassing network security like web proxies that rely on reputation.
  • GenAI helping to create malicious HTML documents: Researchers also identified an XWorm remote access trojan (RAT) campaign initiated by HTML smuggling, which contained malicious code that downloads and runs the malware. Notably, similar to an AsyncRAT campaign analyzed in the previous quarter, the loader bore hallmarks that indicate that it may have been written with the help of GenAI, for example, including a line-by-line description and the design of the HTML page.
  • Gaming cheaters never prosper: Attackers are compromising video game cheat tools and modification repositories hosted on GitHub, adding executable files containing Lumma Stealer malware. This infostealer scrapes victims’ passwords, crypto wallets, and browser information. Users frequently deactivate security tools to download and use cheats, putting them at greater risk of infection without isolation technology in place.

Alex Holland, Principal Threat Researcher in the HP Security Lab, commented: “The campaigns analysed provide further evidence of the commodification of cybercrime. As malware-by-numbers kits are more freely available, affordable, and easy to use, even novices with limited skills and knowledge can put together an effective infection chain.

“Throw GenAI into the mix to write the scripts, and the barriers to entry get even lower. This allows groups to concentrate on tricking their targets and picking the best payload for the job – for instance by targeting gamers with malicious cheat repositories.”

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 65 billion email attachments, web pages, and downloaded files with no reported breaches.

The report, which examines data from calendar Q3 2024, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as:

  • At least 11% of email threats identified by HP Sure Click bypassed one or more email gateway scanners.
  • Executables were the most popular malware delivery type (40%), followed by archive files (34%).
  • There was a notable rise in .lzh files, which made up 11% of archive files analysed – with most malicious .lzh archive files targeting Japanese-speaking users.

Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., commented: “Cybercriminals are rapidly increasing the variety, volume, and velocity of their attacks. If a malicious Excel document is blocked, an archive file in the next attack may slip through the net. Instead of trying to detect rapidly shifting infection methods, organizations should focus on reducing their attack surface. This means isolating and containing risky activities such as opening email attachments, clicking on links, and browser downloads to reduce the chances of a breach.”

HP Wolf Security runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behaviour.

Categories : World Focus

Tags : AI HP Inc Malware Threat Report Wolf Security

  • G&G Jan 2025 Big&Bold
  • Biuromax Web Ad Feb 2025
  • Ink Tank March 25 Web ad
  • Static Control June 2022 Big & Bold Ad
  • Cartridge Web March 25 Web ad
  • Keypoint Intelligence March 2025 web ad
  • IR Italiana Web ad January 2021
  • Integral Web Banner Feb 2025
  • GM Technology Feb 2025 Web Ad
  • HYB Web banner Jan 2024
  • Zhono Web ad March 2024
  • Denner Feb 2024 Web Ad
  • Mito Web banner June 2024
  • CET Web ad December 2023
  • GM Technology Feb 2025 Web Ad
  • CET Web ad December 2023
  • Zhono Web ad March 2024
  • Denner Feb 2024 Web Ad
  • Mito Web banner June 2024
  • Integral Web Banner Feb 2025
  • HYB Web banner Jan 2024
  • CET Web ad December 2023
  • Integral Web Banner Feb 2025
  • Mito Web banner June 2024
  • GM Technology Feb 2025 Web Ad
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • Zhono Web ad March 2024

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark

The Recycler Subscribe Web ad January 2021
The Recycler Subscribe Web ad January 2021