{"id":61088,"date":"2022-12-08T11:00:20","date_gmt":"2022-12-08T17:00:20","guid":{"rendered":"https:\/\/hcsblogdotorg.wordpress.com\/?p=61088"},"modified":"2022-12-08T11:00:20","modified_gmt":"2022-12-08T17:00:20","slug":"cyber-security-worok-powerful-malware-hidden-in-png-images","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2022\/12\/08\/cyber-security-worok-powerful-malware-hidden-in-png-images\/","title":{"rendered":"Cyber-Security: WOROK &#8211; Powerful Malware Hidden in .PNG Images"},"content":{"rendered":"<h1><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-61090\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2022\/12\/png-malware.jpg?w=620\" alt=\"\" width=\"620\" height=\"312\" \/><\/h1>\n<h1 style=\"text-align: center\"><a href=\"https:\/\/www.offgridweb.com\/preparation\/worok-powerful-malware-hidden-in-png-images\/\">WOROK: Powerful Malware Hidden in .PNG Images<\/a><\/h1>\n<p>&nbsp;<\/p>\n<blockquote>\n<h2><em>&#8220;Unless it&#8217;s your first day on the internet, you&#8217;re probably aware that downloading certain files can be a serious mistake. It doesn&#8217;t take a <a href=\"https:\/\/www.offgridweb.com\/preparation\/cyber-threat-awareness-how-to-prepare-for-a-cyberattack-on-the-grid\/\">cybersecurity<\/a>\u00a0expert to know that double-clicking the\u00a0TotallyNotAVirus.exe\u00a0file that mysteriously appeared in your downloads folder is a bad idea. If you&#8217;re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an\u00a0<strong>image file?\u00a0<\/strong>A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they&#8217;ve been using it to target governments and large corporations around the world.&#8221;<\/em><\/h2>\n<p>&nbsp;<\/p><\/blockquote>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-39386\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2021\/01\/aicyber2.jpeg?w=620\" alt=\"\" width=\"620\" height=\"388\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WOROK: Powerful Malware Hidden in .PNG Images &nbsp; &#8220;Unless it&#8217;s your first day on the internet, you&#8217;re probably aware that downloading certain files can be a serious mistake. It doesn&#8217;t take a cybersecurity\u00a0expert to know that double-clicking the\u00a0TotallyNotAVirus.exe\u00a0file that mysteriously appeared in your downloads folder is a bad idea. If you&#8217;re a bit more security&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[5478,2805,2122,13,4445,5653,1317,4912,4126,883,4479,3986,5838,14086,4764,3712,10],"tags":[15365,5001,15366,11763,5002,58,15367],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/61088"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=61088"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/61088\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=61088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=61088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=61088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}