ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: DT028
  • Created: 31st May 2024
  • Updated: 31st May 2024
  • Platforms: Windows, Linux, MacOS,
  • Contributor: The ITM Team

File Metadata

Metadata can provide rich information about a file and its content. This can include modified, accessed, and created timestamps, file type, file size, and more.

Sections

ID Name Description
AF018.003Canary Tokens

A subject uses files with canary tokens as a tripwire mechanism to detect the presence of security personnel or investigation activities within a compromised environment. This method involves strategically placing files embedded with special identifiers (canary tokens) that trigger alerts when accessed. For example:

 

The subject creates files containing canary tokens—unique identifiers that generate an alert when they are accessed, opened, or modified. These files can appear as regular documents, logs, configurations, or other items that might attract the attention of an investigator during a security response.

 

The subject strategically places these files in various locations within the environment:

  • Endpoints: Files with canary tokens are stored in directories where digital forensics or malware analysis is likely to occur, such as system logs, user data directories, or registry entries.
  • Cloud Storage: The files are uploaded to cloud storage buckets, virtual machines, or application databases where security teams might search for indicators of compromise.
  • Network Shares: Shared drives and network locations where forensic investigators or security tools may perform scans.

 

Once in place, the canary token within each file serves as a silent tripwire. The token monitors for access and automatically triggers an alert if an action is detected:

  • Access Detection: If a security tool, administrator, or investigator attempts to open, modify, or copy the file, the embedded canary token sends an alert to an external server controlled by the subject.
  • Network Traffic: The token can initiate an outbound network request (e.g., HTTP, DNS) to a specified location, notifying the subject of the exact time and environment where the access occurred.
  • Behavior Analysis: The subject might include multiple canary files, each with unique tokens, to identify the pattern of investigation, such as the sequence of directories accessed or specific file types of interest to the security team.

 

Upon receiving an alert from a triggered canary token, the subject can take immediate steps to evade detection:

  • Alert the Subject: The canary token sends a covert signal to the subject's designated server or communication channel, notifying them of the potential investigation.
  • Halt Malicious Activity: The subject can use this warning to suspend ongoing malicious actions, such as data exfiltration or command-and-control communications, to avoid further detection.
  • Clean Up Evidence: Scripts can be triggered to delete or alter logs, remove incriminating files, or revert system configurations to their original state, complicating any forensic investigation.
  • Feign Normalcy: The subject can restore or disguise compromised systems to appear as though nothing suspicious has occurred, minimizing signs of tampering.

 

By using files with canary tokens as tripwires, a subject can gain early warning of investigative actions and respond quickly to avoid exposure. This tactic allows them to outmaneuver standard security investigations by leveraging silent alerts that inform them of potential security team activity.

AF008.001Image Steganography

A subject uses image steganography to hide data in an image, to exfiltrate that data and to hide the act of exfiltration.

Image steganography methods can be categorised based on how data is embedded within an image. These methods vary in capacity (amount of data stored), detectability (resistance to steganalysis), and robustness (resistance to compression or modification). Below are the primary techniques used:

 

Least Significant Bit (LSB) Steganography

  • One of the most common and simple methods.
  • Modifies the least significant bits (LSBs) of pixel values to encode secret data.
  • Minimal visual impact since changes occur in the lowest bit planes.

 

How it works:

  • Each pixel in an image consists of three color channels (Red, Green, and Blue).
  • The LSB of each channel is replaced with bits from the hidden message.

 

Example:

  • Original pixel: (10101100, 11011010, 11101101)
  • After encoding: (10101101, 11011010, 11101100)
  • Only minor changes, making detection difficult.

 

Advantages:

  • High capacity when applied to all three channels.
  • Simple and easy to implement.

Disadvantages:

  • Highly susceptible to detection and compression (JPEG compression removes LSB changes).
  • Easily detected by statistical analysis methods.

 

Masking and Filtering Steganography

  • Works similarly to watermarking by altering the luminance or contrast of an image.
  • Best suited for lossless formats like BMP and PNG, not JPEG.

 

How it works:

  • Hidden data is embedded in textured or edge-rich areas to avoid easy detection.
  • Modifies pixel intensity slightly, making it harder to detect through simple LSB analysis.

 

Advantages:

  • More robust than LSB against lossy compression and scaling.
  • Works well for grayscale and color images.

Disadvantages:

  • Lower capacity than LSB.
  • More complex to implement.
     

Transform Domain Steganography

  • Instead of modifying pixel values directly, this technique embeds data in frequency components after applying a mathematical transformation.

 

Types of Transform Domain Methods:

a. Discrete Cosine Transform (DCT) Steganography

  • Used in JPEG images, where data is embedded in DCT coefficients instead of pixels.
  • Common algorithm: F5 steganography (JSteg is an older, less secure method).

 

How it works:

  • The image is converted to frequency domain using DCT.
  • The hidden data is embedded in the mid-frequency DCT coefficients to avoid detection.
  • The image is recompressed using JPEG encoding.

 

Advantages:

  • Resistant to LSB steganalysis.
  • Works with JPEG, making it more practical.

Disadvantages:

  • Lower data capacity than LSB.
  • Can be detected by statistical steganalysis.

 

b. Discrete Wavelet Transform (DWT) Steganography

  • Uses wavelet transformation to embed data in high or low-frequency components.

 

How it works:

  • The image is broken into multiple frequency bands using DWT.
  • Data is embedded in high-frequency coefficients, ensuring robustness.
  • Common in medical image steganography for secure data transmission.

 

Advantages:

  • More robust against compression and noise than DCT.
  • Can embed more data than traditional DCT methods.

Disadvantages:

  • Requires more complex computation.
  • Can be detected by advanced steganalysis tools.

 

c. Fourier Transform-Based Steganography

  • Uses Fast Fourier Transform (FFT) to embed secret data in the frequency spectrum.
  • More resistant to image processing operations like scaling and rotation.

 

Advantages:

  • High robustness.
  • Harder to detect using common LSB-based analysis.

Disadvantages:

  • Requires complex processing.
  • Limited in data capacity.

 

Palette-Based and Color Modification Techniques

 

a. Palette-Based Steganography (GIF, PNG)

  • Modifies indexed color tables instead of pixels.
  • Works by shifting palette entries in GIF or PNG images.

 

Advantages:

  • No direct pixel modifications, making it hard to detect visually.

Disadvantages:

  • Can be detected by comparing original and modified color palettes.
  • Limited to certain file formats.

 

b. Alpha Channel Manipulation

  • Uses transparency layers in images (e.g., PNG with alpha channels) to store hidden data.

 

Advantages:

  • Harder to detect in images with multiple layers.

Disadvantages:

  • Only works in formats supporting alpha transparency (PNG, TIFF).

 

Edge-Based and Texture-Based Steganography

 

a. Edge Detection Steganography

  • Embeds data only in edge regions of an image, avoiding smooth areas.
  • Uses Canny edge detection or similar algorithms.

 

Advantages:

  • Harder to detect using basic LSB analysis.
  • Can withstand minor modifications.

Disadvantages:

  • Requires pre-processing.
  • Lower capacity than LSB.

 

b. Patchwork Algorithm

  • Uses redundant patterns to embed data, making detection harder.
  • Works well for texture-rich images.

 

Advantages:

  • High resistance to compression and cropping.

Disadvantages:

  • Complex encoding and decoding process.

 

Spread Spectrum and Noise-Based Techniques

 

a. Spread Spectrum Steganography

  • Mimics radio communication techniques, distributing data across the entire image.
  • Uses pseudo-random noise patterns to hide data.

 

Advantages:

  • Harder to detect due to randomness.

Disadvantages:

  • Lower data capacity.

 

b. Statistical Steganography

  • Alters color distributions or histogram properties to encode data.
  • Ensures changes remain within natural variations.

 

Advantages:

  • Very stealthy and hard to detect.

Disadvantages:

  • Limited data capacity.

 

Adaptive and AI-Based Steganography

  • Uses machine learning to optimize embedding locations.
  • Adaptive algorithms select least noticeable areas dynamically.


Advantages:

  • Extremely stealthy and resistant to detection.

Disadvantages:

  • Requires computational power.

 

Comparison Table of Image Steganography Methods

 

MethodCapacityRobustnessDetectabilityComplexity
LSBHighLowHighLow
DCTMediumHighMediumMedium
DWTMediumHighMediumHigh
FFTLowVery HighLowVery High
Edge-BasedLowMediumLowMedium
Spread SpectrumLowVery HighLowHigh