{"id":3169,"date":"2025-01-16T13:12:25","date_gmt":"2025-01-16T13:12:25","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/16\/hackers-hide-malware-in-images-to-deploy-vip-keylogger-and-0bj3ctivity-stealer\/"},"modified":"2025-01-16T13:12:25","modified_gmt":"2025-01-16T13:12:25","slug":"hackers-hide-malware-in-images-to-deploy-vip-keylogger-and-0bj3ctivity-stealer","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/16\/hackers-hide-malware-in-images-to-deploy-vip-keylogger-and-0bj3ctivity-stealer\/","title":{"rendered":"Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer"},"content":{"rendered":"<p>\u200bThreat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns.<br \/>\n&#8220;In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads,&#8221; HP Wolf Security said in its Threat Insights Report\u00a0Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns.<br \/>\n&#8220;In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads,&#8221; HP Wolf Security said in its Threat Insights Report\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. &#8220;In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads,&#8221; HP Wolf Security&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/16\/hackers-hide-malware-in-images-to-deploy-vip-keylogger-and-0bj3ctivity-stealer\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":3170,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3169"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=3169"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3169\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/3170"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=3169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=3169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=3169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}