Stegano Exploit Kit Hiding Within GIF-Based Browser Ads, Remained Largely Undetected for 2 Years: Report

Advertisement
By Shekhar Thakran | Updated: 9 December 2016 18:41 IST
Highlights
  • The exploit kit was being served b major for at least two months
  • Makes use of Internet Explorer vulnerability
  • Exploit was targeting corporate sector and payment services

The ads that appear on websites can sometimes prove to be intrusive to a user's experience, though most major ad networks alongside modern browsers protect users from ad-based attacks. However, if new report by Eset researchers is anything to go by, a certain type of malicious ad that can steal all of the victim's information has been flying under the radar for over two years now, and has been served on major networks for at least two months now.

Eset says Stegano Exploit Kit was targeting corporate sector and especially banking services for the last two years without being detected by the major networks. The two main culprit ads highlighted by Eset belong to "Broxu" screenshot app and ironically "Browser Defence." The long-discontinued but still in use Internet Explorer is said to be the only vulnerable browser. The exploit code is hidden within layers of the GIF-based ads, and has been avoiding detection by only activating after determining the victim's machine doesn't contain sandboxes environments usually used by security researchers.

Without even requiring user interaction, the first script sends the information regarding their machine to the remote attacker and "based on server-side logic, the target is then served either a clean image or its almost imperceptibly modified malicious evil twin," Eset reports. The infected version of the graphic comes with the script encoded in the alpha channel (or transparency) of the GIF image, and as there is only a minor modification, the infected graphic is almost identical to the original.

Advertisement

After the new ad is placed, it runs an environment check through a javascript to make sure it is not being monitored. Another script makes use of a known Internet Explorer vulnerability CVE-2016-0162 to scan, extract, and run the code. It even ensures that it is running on an actual PC.

Advertisement

"If no indication of monitoring is detected, it creates an iframe (just one pixel in size) at coordinates off the screen, sets its window.name property (this name will be used later) and redirects to TinyURL via https. TinyURL then redirects to an exploit landing page via http. The referrer to the original site is lost during this process," Eset said.

The landing page then checks for Internet Explorer and loads a Flash file that has another Flash file within it. Depending on the version of Flash that it finds, the latter can serve one of three exploits. In order to check, it gives the information back to the server, as a GIF file. The server then returns a code to indicate one of three Flash vulnerability exploits, along with the required password shell code that allows for downloading of the final payload.

Advertisement

After performing another check to ensure it is not being detected by a security analyst, the payload is downloaded and launched. The user can then be infected with a backdoor, keylogger, screenshot maker, and video maker, Engadget points out. At this point, user's entire machine is compromised. While the Stegano exploit kit has been around for a while, no succesful exploits have been detected yet.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Oppo K14 5G Roundup: Here's Everything That We Know So Far
  1. Astronomers Create the Largest 3D Map of the Early Universe’s Hydrogen Glow
  2. The Boys Season 5 OTT Release: When, Where to Watch the Final Season of the Superhero Series
  3. Laalo – Krishna Sada Sahaayate OTT Release: When, Where to Watch the Gujarati Spiritual Drama
  4. Vikram On Duty OTT Release: When, Where to Watch Nikhil Maliyakkal’s Telugu Crime Thriller
  5. Annagaru Vostaru OTT Release: When, Where to Watch Karthi’s Telugu Action-Comedy
  6. Local Times OTT Release: Know When and Where to Watch the Tamil Comedy Drama Online
  7. Vivo X300 Max With Zeiss Cameras and Android 16 Spotted at MWC 2026, Could Launch Soon
  8. WhatsApp Update Introduces Support for Discovering Stickers While Typing Emoji: How It Works
  9. This AI-Powered Portable Device Claims to Detect Microphones and Jam Audio Recordings
  10. Poco X8 Pro Series Global Launch Date Leaked Ahead of Anticipated Debut: Expected Price, Specifications
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.