New ways to spread malware are constantly being invented. Like this new way of distribution via Steam profile pictures.

A newly discovered type of malware distribution uses profile pictures on the popular gaming platform “Steam”. The malicious code is hidden in the image files and is decrypted and loaded by another malicious program.

Malware in image files

The fact that malware can be hidden in image files is nothing new - but at least G DATA malware analyst Karsten Hahn has never seen a public games platform like Steam being effectively misused as a download server in this form. Although this type of malware distribution is not actively used yet, it is clear that criminals are currently actively working on and refining the method.

A user doesn't even have to have Steam or any other gaming platform installed or have an account there. As soon as the appropriate downloader, which can be hidden in an email attachment, is started, it downloads the image file and extracts the malicious code hidden in it.

This method has several advantages for criminals as it allows them to deploy their malicious code quickly and effectively. It doesn't make a big difference for users - they can still protect themselves from malware by being careful and skeptical when dealing with file attachments, for example.

[mk_ad]

Source: GData
Also interesting:
Since the beginning of Facebook, there has been the claim that you can use tricks to see who has visited your profile. But such “profile viewers” ​​are always fraud!

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )