MilikMilik

How Hackers Hide Trojans Inside Everyday Image Files—and What You Can Do

How Hackers Hide Trojans Inside Everyday Image Files—and What You Can Do

From Harmless Picture to Hidden Threat: Inside Operation SilentCanvas

A file named “sysupdate.jpeg” sitting in your downloads folder looks like an ordinary picture, but in Operation SilentCanvas it is actually a PowerShell script disguised as an image. Cybersecurity researchers found that attackers are weaponizing fake JPEG files to deliver trojan horse malware onto Windows systems. These files often lack proper JPEG headers, but still slip past basic checks that trust common image formats. Once opened or processed by the right script, the malicious content runs as code, not as a photo, effectively turning JPEG file security into a serious weak point. Because the Windows security bypass abuse happens through what appears to be a non-executable file, many users and traditional defenses never suspect it. Both home and enterprise devices are at risk, especially when these files arrive via phishing emails or deceptive download links.

How the Fake JPEG Attack Chain Bypasses Windows Security

When the disguised file is triggered, the embedded PowerShell script quietly creates a hidden C:\Systems folder and contacts a remote server over encrypted channels. It then downloads a trojanized ScreenConnect package from a domain that appears legitimate and installs it under C:\ProgramData\OneDriveServer\. A second payload named “access.jpeg” runs entirely in memory, helping the malware evade many disk-based antivirus tools. To complete the Windows security bypass, the malware hijacks the ms-settings registry key so it can launch ComputerDefaults.exe and sidestep User Account Control prompts without the victim noticing. This registry key is wiped within two seconds, erasing an important forensic clue. The result is a stealthy, multi-stage compromise that uses normal-seeming files, trusted Windows components, and legitimate remote management software to avoid raising alarms.

What a Remote Access Trojan Can Do Once It’s Inside

The payload delivered through these fake JPEGs is a full-featured remote access trojan built around a modified ScreenConnect tool. After installation, it turns the victim’s PC into a surveillance and control platform. Attackers can monitor the screen in real time, capture keystrokes, and steal files through encrypted connections. They may also access microphone and camera feeds or grab clipboard data, allowing them to harvest passwords, personal documents, and sensitive corporate information. Persistence is achieved by creating an “OneDriveServers” service so the malware automatically restarts after every reboot. Because this remote access trojan relies heavily on legitimate utilities, standard security tools may see its activity as normal administration. That makes early detection difficult for both personal users and enterprises unless they actively monitor for unusual remote sessions and unexpected background services.

How Attackers Lure You: Phishing, Fake Notices, and Bogus Updates

To deliver the booby-trapped JPEGs, attackers lean on social engineering rather than obvious exploits. Many Operation SilentCanvas samples arrive as email attachments that impersonate official Social Security Administration notices or urgent software update prompts. Victims are urged to open an attached “image” or download a supposed update, which quietly launches the embedded script instead of displaying a photo. This tactic mirrors broader trends in phishing attack prevention, where criminals mix believable branding, convincing language, and familiar file types to gain trust. Related campaigns, such as ClickFix, have even used steganography to hide shellcode inside PNG files shown on fake Windows Update pages. Because users generally assume that image files are safe, they are more likely to click without hesitation, making such lures effective against both office workers and home users.

Practical Protection: Verifying Images and Hardening Your Devices

You cannot judge a file’s safety by its icon, name, or extension alone. For stronger JPEG file security, enable file extensions in your operating system and be suspicious of images tied to urgent requests, unexpected forms, or account problems. Use reputable antivirus and endpoint protection tools that inspect behavior, not just file signatures, and turn on PowerShell logging to flag scripts launched from unusual locations or file types. In business environments, use application whitelisting to block abuse of binaries such as csc.exe and ComputerDefaults.exe, and tightly control remote support tools like ScreenConnect. For phishing attack prevention, train yourself and your team to verify senders, avoid clicking attachments in unsolicited messages, and instead log in directly to official websites. If you suspect infection, reset stored credentials immediately and check for suspicious folders like C:\Systems and C:\ProgramData\OneDriveServer\.

Comments
Say Something...
No comments yet. Be the first to share your thoughts!