Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
ImageGate: Images contain ransomware!
Offensive Security

ImageGate: Images contain ransomware!

Images contain ransomware: It is a new method to get infected with Locky! Up to now, the widespread encryption trojan came preferably via an email mailbox on th...

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 9, 2024 3 Min. read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Table of Contents (1 sections)

Images contain ransomware: It is a new method to get infected with Locky! Up to now, the widespread encryption trojan came preferably via an email mailbox on the computer. The strategy is now changing. Social networks are in focus! Images contain ransomware - do not download! It’s no longer the dubious e-mail with a Word file attached (although the attack is still popular with HR departments). The attackers, hackers and cyber criminals have found a way to put the Trojan in image files. Want to download a wallpaper from Facebook? It could happen that a dubious format is suggested to you! This way you protect yourself from Locky and other encryption Trojans! You have clicked on a picture and your browser starts a download, although you only wanted to look at a picture? You should not open the file under any circumstances. After all, in social media you can view pictures without downloading anything! The pictures contain an unusual format such as SVG, JS or HTA? Another sign of an infected image file! Only SVG is a common format for images - but for vector graphics, and not for social networks1!

Images contain ransomware? Are there any further details?

Check Point, the discoverers of the method, will not release technical details until the vulnerability has been fixed on the largest and most important websites. The publication is not intended to encourage others to test the vulnerability2. If you want to get an impression of how an infection works, you can watch the following video: https://www.youtube.com/watch?v=sGlrLFo43pY&feature=youtu.be

Images contain ransomware!

The attackers become more and more creative and find more gaps. By means of such examples you can see this impressively! However, this attack is particularly critical because there is a particularly large target group. Since one runs the risk of catching an encryption Trojan in social networks also rather rarely, this possibility can bring particularly high “encryption rates”! If a prominent Facebook account is hacked, a few seconds are enough to infect the first fans and followers with Locky! For this reason, this should be corrected quickly before the vulnerability is systematically exploited. Attention for image files with: .svg .js or .hta extensions!

Weitere Informationen und Quellen

[1] Check Point uncovers a new method for distributing malware through images (checkpoint) [2] Check Point entlarvt neue Lücken für Ransom- und Malware (Caschys Blog) [3] Neue Methode zur Verbreitung von Malware durch Bilder (All-about-security)

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung