BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems

Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems

February 23, 2026Data Breaches & Incidents2 min readmedium

Originally reported by Hackread

#steganography#malware#supply-chain#password-managers#xworm#pulsar-rat#npm#phishing
Share

TL;DR

Three separate campaigns demonstrate advanced steganographic malware deployment: XWorm 7.2 in Excel files, Pulsar RAT in NPM packages, and critical password manager vulnerabilities.

Why medium?

Multiple active malware campaigns using sophisticated steganographic techniques to evade detection, targeting both individual users and enterprise systems through supply chain and phishing vectors.

XWorm 7.2 Concealed in Excel-Embedded JPEG Files

A sophisticated phishing campaign is distributing XWorm 7.2 malware by embedding it within JPEG images attached to malicious Excel files. The attack chain begins with weaponized Excel documents that exploit Microsoft Office vulnerabilities to extract and execute the hidden payload.

Once deployed, XWorm 7.2 employs process hollowing techniques to inject itself into legitimate Windows processes, effectively evading endpoint detection systems. The malware implements AES encryption to secure its command and control communications while harvesting stored passwords, Wi-Fi credentials, and other sensitive data from infected systems.

The steganographic approach allows the malicious payload to bypass traditional file-based security scanning, as the JPEG images appear benign to most security tools that rely on static analysis.

Password Manager Vulnerabilities Expose Encrypted Vaults

Security researchers have identified 27 distinct attack vectors against major password management platforms, revealing fundamental design flaws that could compromise encrypted vault integrity. The demonstrated attacks exploit scenarios where password manager servers become compromised or where implementation weaknesses allow unauthorized access to supposedly secure vault data.

While specific vendor names and technical details were not disclosed in the available reporting, the research highlights critical gaps in how password managers handle server-side security and vault encryption protocols. These vulnerabilities could potentially expose user credentials even when vaults are properly encrypted with strong master passwords.

The findings underscore the importance of zero-knowledge architecture in password management solutions and the risks associated with cloud-based vault storage models.

Pulsar RAT Infiltrates NPM Through Image Steganography

Veracode researchers have uncovered a typosquatting campaign targeting the NPM ecosystem, where attackers distribute Pulsar RAT malware concealed within PNG image files. The attack leverages package name confusion to trick developers into installing malicious dependencies that appear legitimate.

The steganographic technique embeds the RAT payload within PNG image data, allowing it to bypass Windows Defender and other endpoint security solutions that typically scan executable files but may not deeply inspect image formats. Once extracted, Pulsar RAT establishes persistent access to developer workstations and build environments.

This supply chain attack demonstrates the increasing sophistication of threats targeting software development workflows, where compromised developer systems can serve as stepping stones to broader organizational networks.

Sources

  • Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
  • Researchers Demonstrate 27 Attacks Against Major Password Managers
  • Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack

Originally reported by Hackread

Tags

#steganography#malware#supply-chain#password-managers#xworm#pulsar-rat#npm#phishing

Related Intelligence

  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026
  • Security Roundup: Certificate Abuse, Phishing Evolution, and Enterprise Defense Gaps

    highMar 5, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

Next Article

Research Reveals Server-Side Vulnerabilities in Major Password Managers →