Anti-Forensics
Clear Browser Artifacts
Clear Command History
Clear Operating System Logs
Decrease Privileges
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Log Tampering
Modify Windows Registry
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Use of a Virtual Machine
- ID: AF008
- Created: 25th May 2024
- Updated: 10th February 2025
- Contributors: The ITM Team, James Weston,
Steganography
A subject may use steganography methods to attempt to discretely exfiltrate data.
Steganography is the practice of concealing information within other, seemingly innocuous data to prevent detection. Unlike encryption, which obscures the content of a message, steganography hides the very existence of the message. This technique can be employed by insiders to exfiltrate sensitive data without raising suspicion.
Common Steganographic Techniques:
- Images: Data is embedded in image files (e.g., JPEG, BMP) by modifying least significant bits (LSB) of pixel values, maintaining visual integrity.
- Audio/Video: Hidden payloads are encoded within audio or video data streams, leveraging high data density for concealment.
- Text: Information is embedded through subtle alterations, such as extra spaces, character substitutions, or font variations.
Subsections
ID | Name | Description | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AF008.001 | Image Steganography | A subject uses image steganography to hide data in an image, to exfiltrate that data and to hide the act of exfiltration.
Least Significant Bit (LSB) Steganography
How it works:
Example:
Advantages:
Disadvantages:
Masking and Filtering Steganography
How it works:
Advantages:
Disadvantages:
Transform Domain Steganography
Types of Transform Domain Methods:
How it works:
Advantages:
Disadvantages:
b. Discrete Wavelet Transform (DWT) Steganography
How it works:
Advantages:
Disadvantages:
c. Fourier Transform-Based Steganography
Advantages:
Disadvantages:
Palette-Based and Color Modification Techniques
a. Palette-Based Steganography (GIF, PNG)
Advantages:
Disadvantages:
b. Alpha Channel Manipulation
Advantages:
Disadvantages:
Edge-Based and Texture-Based Steganography
a. Edge Detection Steganography
Advantages:
Disadvantages:
b. Patchwork Algorithm
Advantages:
Disadvantages:
Spread Spectrum and Noise-Based Techniques
a. Spread Spectrum Steganography
Advantages:
Disadvantages:
b. Statistical Steganography
Advantages:
Disadvantages:
Adaptive and AI-Based Steganography
Disadvantages:
Comparison Table of Image Steganography Methods
|