Scenario: Stegware - Covert Data Loss
OVERVIEW: Steganography is used by an attacker/insider to conceal information through the means of encoding data in a cover image. The image does not indicate the presence of steganography being applied - the image looks normal but the concealed data will pass through ALL Data Loss Prevention tools - detection fails to see the encoded content.
BUSINESS PROBLEM: Intellectual Property can be covertly concealed using simple steg encoding, tools are freely available online.
THREAT: Steganography can not be detected (it is robust). Encoded data is not visible.


SAMPLE 2: Morgan Cars
Stegged Image (aka Cover Image)
SAMPLE 3: Online Banking
Stegged Image (aka Cover Image)
TEST USING GX PLATFORM:
With CTR DISABLED (i.e. the ICAP profile is disabled on the Web Proxy)
With CTR ENABLED
OUTCOME
THE HIDDEN MESSAGE
ADVANCED
Note: If a Deep Secure Consultant or technical resource from a Channel Partner is onsite during this scenario then they will be able to show the image encode/decode process.