{"id":6877,"date":"2024-04-26T10:46:28","date_gmt":"2024-04-26T07:46:28","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=6877"},"modified":"2024-04-26T10:46:35","modified_gmt":"2024-04-26T07:46:35","slug":"malware-hiding-in-pictures-more-likely-than-you-think","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/","title":{"rendered":"Malware hiding in pictures? More likely than you think"},"content":{"rendered":"\n<p>Cybersecurity software has grown quite capable of detecting suspicious files, and with businesses becoming increasingly aware of the need to up their security posture with additional layers of protection, subterfuge to evade detection has become necessary.<\/p>\n\n\n\n<p>In essence, any cybersecurity software is strong enough to detect most malicious files. Hence, threat actors continually seek different ways to evade detection, and among those techniques is using malware hidden in images or photos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware hiding in images<\/h2>\n\n\n\n<p>It might sound far-fetched, but it is quite real. Malware placed inside images of various formats is a result of&nbsp;<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-steganography-guide-meaning-types-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">steganography<\/a>, the technique of hiding data within a file to avoid detection. ESET Research spotted this technique being used by the&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/09\/06\/worok-big-picture\/\" target=\"_blank\" rel=\"noreferrer noopener\">Worok cyberespionage group<\/a>, who hid malicious code in image files, only taking specific pixel information from them to extract a payload to execute. Do mind that this was done on already compromised systems though, since as mentioned previously, hiding malware inside images is more about evading detection than initial access.<\/p>\n\n\n\n<p>Most often, malicious images are made available on websites or placed inside documents. Some might remember adware:&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/12\/06\/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads\/\" target=\"_blank\" rel=\"noreferrer noopener\">code hidden in ad banners<\/a>.&nbsp; Alone, the code in the image cannot be run, executed, or extracted by itself while embedded. Another piece of malware must be delivered that takes care of extracting the malicious code and running it. Here the level of user interaction required is various and how likely someone is to notice malicious activity seems more dependent on the code that is involved with the extracting than on the image itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The least (most) significant bit(s)<\/h2>\n\n\n\n<p>One of the more devious ways to embed malicious code in an image is to replace the least significant bit of each red-green-blue-alpha (RGBA) value of every pixel with one small piece of the message. Another technique is to embed something into an image\u2019s alpha channel (denoting the opacity of a color), using only a reasonably insignificant portion. This way, the image appears more or less the same as a regular one, making any difference hard to detect with the naked eye.<\/p>\n\n\n\n<p>An example of this was when legitimate advertising networks served up ads that potentially led to a malicious banner being sent from a compromised server. JavaScript code was extracted from the banner, exploiting the&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-0162\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2016-0162 vulnerability<\/a>&nbsp;in some versions of Internet Explorer, to get more information about the target.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2024\/3-2024\/malware-code-in-image-1.png\" alt=\"Two images. with one being more blurry, hiding malicious code\" title=\"Maybe not so obvious at first, but the image on the right is malicious - notice how it is slightly off, a bit more blurry\"\/><figcaption class=\"wp-element-caption\"><em>It might seem like both pictures are the same, but one of them includes malicious code in the alpha channel of its pixels. Notice how the picture on the right is strangely pixelated.&nbsp;<br>(Source: ESET Research)<\/em><\/figcaption><\/figure>\n\n\n\n<p>Malicious payloads extracted from pictures could be used for various purposes. In the Explorer vulnerability case, the extracted script checked whether it was running on a monitored machine \u2014 like that of a malware analyst. If not, then it redirected to an&nbsp;<a href=\"https:\/\/www.eset.com\/blog\/business\/exploit-kits-what-are-they-and-what-is-an-exploit-blocker\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=malware&amp;utm_term=en\" target=\"_blank\" rel=\"noreferrer noopener\">exploit kit<\/a>&nbsp;landing page. After exploitation, a final payload was used to deliver malware such as backdoors, banking trojans, spyware, file stealers, and similar.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2024\/3-2024\/malware-in-picture-2.png\" alt=\"Three blue pictures, with the last one hiding dark spots with malware\" title=\"On the left is a clean image, while the two on the right harbor malicious code\"\/><figcaption class=\"wp-element-caption\"><em>From left to right: Clean image, image with malicious content, and the same malicious image enhanced to highlight the malicious code (Source: ESET Research)<\/em><\/figcaption><\/figure>\n\n\n\n<p>As you can see, the difference between a clean and a malicious image is rather small. For a regular person, the malicious image might look just slightly different, and in this case, the weird look could be chalked up to poor picture quality and resolution, but the reality is that all those dark pixels highlighted in the picture at the right are a sign of malignant code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">No reason to panic&nbsp;<\/h2>\n\n\n\n<p>You might be wondering, then, whether the images you see on social media could harbor dangerous code. Consider that images uploaded to social media websites are usually heavily compressed and modified, so it would be very problematic for a threat actor to hide fully preserved and working code in them. This is perhaps obvious when you compare how a photo appears before and after you\u2019ve uploaded it to Instagram \u2014 typically, there are clear quality differences.<\/p>\n\n\n\n<p>Most importantly, the RGB pixel-hiding and other steganographic methods can only pose a danger when the hidden data is read by a program that can extract the malicious code and execute it on the system. Images are often used to conceal malware downloaded from&nbsp;<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/command-and-control-server-CC-server\" target=\"_blank\" rel=\"noreferrer noopener\">command and control (C&amp;C)<\/a>&nbsp;servers to avoid detection by cybersecurity software. In one case, a trojan called&nbsp;<a href=\"https:\/\/attack.mitre.org\/software\/S0230\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZeroT<\/a>, through infested Word docs attached to emails, was downloaded onto victims\u2019 machines. However, that\u2019s not the most interesting part. What\u2019s interesting is that it also downloaded a variant of the PlugX RAT (aka Korplug) \u2014 using steganography to extract malware from an&nbsp;<a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/APT-targets-russia-belarus-zerot-plugx\" target=\"_blank\" rel=\"noreferrer noopener\">image of Britney Spears<\/a>.<\/p>\n\n\n\n<p>In other words, If you are protected from trojans like ZeroT, then you do not need to care as much about its use of steganography.<\/p>\n\n\n\n<p>Finally, any exploit code that is extracted from images depends on vulnerabilities being present for successful exploitation. If your systems are already patched, there is no chance for the exploit to work; hence, it is a good idea to always keep your cyber-protection, apps, and operating systems up to date. Exploitation by exploit kits can be avoided by running fully patched software and using a reliable, updated&nbsp;<a href=\"https:\/\/www.eset.com\/int\/home\/protection-plans\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=malware&amp;utm_term=en\" target=\"_blank\" rel=\"noreferrer noopener\">security solution<\/a>.<\/p>\n\n\n\n<p>The same&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/01\/03\/breaking-habit-top-10-bad-cybersecurity-habits-shed-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity rules<\/a>&nbsp;apply as always \u2014 and awareness is the first step toward a more cyber secure life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity software has grown quite capable of detecting suspicious files, and with businesses becoming increasingly aware of the need to up their security posture with additional layers of protection, subterfuge to evade detection has become necessary. In essence, any cybersecurity software is strong enough to detect most malicious files. Hence, threat actors continually seek different<\/p>\n","protected":false},"author":5,"featured_media":6878,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148],"tags":[],"class_list":["post-6877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malware hiding in pictures? More likely than you think - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware hiding in pictures? More likely than you think\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity software has grown quite capable of detecting suspicious files, and with businesses becoming increasingly aware of the need to up their security posture with additional layers of protection, subterfuge to evade detection has become necessary. In essence, any cybersecurity software is strong enough to detect most malicious files. Hence, threat actors continually seek different\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T07:46:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T07:46:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Malware hiding in pictures? More likely than you think\",\"datePublished\":\"2024-04-26T07:46:28+00:00\",\"dateModified\":\"2024-04-26T07:46:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/\"},\"wordCount\":918,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/mlwr-imgs-wls-1920x1080-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/\",\"name\":\"Malware hiding in pictures? More likely than you think - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/mlwr-imgs-wls-1920x1080-1.jpg\",\"datePublished\":\"2024-04-26T07:46:28+00:00\",\"dateModified\":\"2024-04-26T07:46:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/mlwr-imgs-wls-1920x1080-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/mlwr-imgs-wls-1920x1080-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware hiding in pictures? More likely than you think\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/04\\\/26\\\/malware-hiding-in-pictures-more-likely-than-you-think\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware hiding in pictures? More likely than you think - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/","og_locale":"en_US","og_type":"article","og_title":"Malware hiding in pictures? More likely than you think","og_description":"Cybersecurity software has grown quite capable of detecting suspicious files, and with businesses becoming increasingly aware of the need to up their security posture with additional layers of protection, subterfuge to evade detection has become necessary. In essence, any cybersecurity software is strong enough to detect most malicious files. Hence, threat actors continually seek different","og_url":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2024-04-26T07:46:28+00:00","article_modified_time":"2024-04-26T07:46:35+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Malware hiding in pictures? More likely than you think","datePublished":"2024-04-26T07:46:28+00:00","dateModified":"2024-04-26T07:46:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/"},"wordCount":918,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg","articleSection":["cybersecurity"],"inLanguage":"en-US","copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/","url":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/","name":"Malware hiding in pictures? More likely than you think - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg","datePublished":"2024-04-26T07:46:28+00:00","dateModified":"2024-04-26T07:46:35+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/04\/mlwr-imgs-wls-1920x1080-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Malware hiding in pictures? More likely than you think"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/04\/26\/malware-hiding-in-pictures-more-likely-than-you-think\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=6877"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6877\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/6878"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=6877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=6877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=6877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}