{"id":381043,"date":"2025-02-04T15:47:56","date_gmt":"2025-02-04T15:47:56","guid":{"rendered":"https:\/\/www.techopedia.com\/?p=381043"},"modified":"2025-02-04T15:47:56","modified_gmt":"2025-02-04T15:47:56","slug":"how-black-hat-hackers-hide-malicious-code-in-images","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/how-black-hat-hackers-hide-malicious-code-in-images","title":{"rendered":"This Is How Black Hat Hackers Hide Malicious Code in Images"},"content":{"rendered":"
The technique of hiding malicious code<\/a> in images is not new. Cybercriminals<\/a> can modify files to hide scripts and code in email attachments, PDFs, Excel files, PNGs, JPGs, and even in the body of an email.<\/p>\n However, black hat hackers are always making advancements, customizing their attacks, and embedding even more dangerous tools inside images.<\/p>\n Keylogger<\/strong>, 0bj3ctivityStealer<\/strong>, and Lumma Stealer<\/strong> are three of the most common scamming tools in the wild, and malicious code inside images is fast becoming a distribution path for each.<\/p>\n