• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Russian Hackers Steal Data using Twitter and Coded Images

By Guest Authors

A gang of hackers believed to be coming from Russia has been responsible for a number of attacks on many computers that resulted in the loss of several data, according to a report from security vendor FireEye.

The report finds that the attackers employed a mix of coded online photos and web addresses shared via Twitter to enable the malware dubbed Hammertoss to perpetrate the attack. The malware was developed to automatically create Twitter accounts to share the web addresses and tags that contain information on the size of the photo being used and its location.

cyber-security

The hackers conceal their instructions by embedding it in the images and storing the codes on GitHub. By doing so, they were able to pilfer computer data from various victims.

Here is how the Hammertoss malware works: the malicious software uploaded data to cloud storage accounts of the hackers from the victims’ computers based on the commands that were hidden and encrypted. The technique used to encrypt the commands was steganography, a method of altering the values – series of letters and numbers – that represent the color of a single pixel in a photo.

With only our naked eye, it would be hard to detect these small changes to a pixel, so much so that the difference between the original image and the one being altered would be insignificant. But advanced software tools are now capable of spotting the difference.

By making the changes to the number codes, hackers will be able to create a message that would then send commands with nefarious goals.

An ordinary antivirus software would be of no use to detect the malware’s activity because of the diverse parts embedded in the Hammertoss malware. This eventually makes it hard for security departments to combat the threat and attacks from the hackers.

The onus is now on the network service providers to detect and spot the difference on the command and control communication activities, if ever something beyond the ordinary manifests itself. That means differentiating between illegitimate and legit network traffic.

Any kind of software tool alone would not suffice to ward off the attack, so security experts recommend a collaboration among human resources, technology and information on the attack to mitigate its impact.

The sophisticated tool in question works to pinpoint its target and determine the destination network to which the data would be transmitted. It would only be possible to detect Hammertoss when its complete code is present.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Pexar Starlight 15.6″ Digital Photo Frame Review – Turning Family Photos Into Gallery-Worthy Displays

TourBox Elite Plus Review: A Better Way to Edit in Lightroom Classic

Ugee Trio Pad UT3 Review – A Giant Matte Tablet That Feels Almost Like E-Ink

MEEPO Flow Electric Skateboard Review – A Beginner’s Experience

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Power Through the Holidays: Why the ABOK Ark3600 Is the Ultimate Winter Gift
  • The Sound-Driven Relaxation Revolution: Introducing the Vibroacoustic Therapy Chair
  • Pexar Starlight 15.6″ Digital Photo Frame Review – Turning Family Photos Into Gallery-Worthy Displays
  • Curate the Perfect Workspace: The 2025 Christmas Guide to NuPhy Keyboards for Every Need

Copyright © 2025 · All Rights Reserved