Hacker uses internet meme to send hidden commands to malware

Even memes can be dangerous.
By Michael Kan  for PCMag  on 
Hacker uses internet meme to send hidden commands to malware
Credit: Portrait Images Asia by Nonwarit/Shutterstock

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.

A recently discovered piece of malware has a unique way of communicating with its creator—through an internet meme posted on Twitter.

The mysterious hacker has been using the "What if I told you" meme to secretly tell a Windows-based strain of malware when to grab screenshots from infected PCs, according to security firm Trend Micro.

Although the internet meme look like an ordinary digital image, a simple command is hidden in the file's metadata, Trend Micro VP Mark Nunnikhoven says. The malware, on other hand, has been designed to look up the hacker's Twitter account and scan image files for the secret commands.

"The messages used for this malware are very small (typically one word) meaning that they can be hidden between the metadata and actual pixel layout without changing the image itself," Nunnikhoven said in an email.

The hacker appears to have only posted two malicious memes — on Oct. 25 and 26 — with the command "/print," which will order infected Windows PCs to take a screenshot. Other hidden commands the hacker could've sent through the memes include "/clip" to capture clipboard copied content, and "/processos" to retrieve a list of running processes over the PC.

Mashable Light Speed
Want more out-of-this world tech, space and science stories?
Sign up for Mashable's weekly Light Speed newsletter.
By signing up you agree to our Terms of Use and Privacy Policy.
Thanks for signing up!

The practice of concealing messaging in nontext files such as images or video is called steganography, and it's become an effective way for hackers to sneak malicious code onto people's computers or send hidden commands over the open web.

"Most networking monitoring programs won't notice anything odd about access to Twitter.com," Nunnikhoven added. "A site that's based around a timeline like Twitter also allows the attacker to sequence commands for the malware. This can be an effective way of building a solid command and control channel."

The good news is that Twitter has disabled the hacker's account on its platform. But it isn't clear how the mysterious attacker was circulating the malware, a Trojanized .exe file.

In response to Trend Micro's findings, Twitter told PCMag: "Keeping people safe and secure on Twitter is our top priority. If content on Twitter is used for malicious purposes, we take action and remove it. Twitter plays no part in the distribution of the malware involved in this campaign."

However, the company didn't address questions over what Twitter can do to stop similar meme-based malware schemes in the future. Meanwhile, others have shown you can cram a whole lot of data, include ZIP archives, inside an image on Twitter, raising the possibility that hackers could employ the same tactic again.


Recommended For You
Gear up for the new year with an Apple M2 Mac mini at its lowest price yet
Apple Mac Mini on colorful abstract background

50+ of the best Cyber Monday monitor deals
the razer raptor 27 against a shadowy rainbow background

50+ of the best early Cyber Monday monitor deals
the razer raptor 27 against a shadowy rainbow background

50+ of the best Black Friday monitor deals
the razer raptor 27 against a shadowy rainbow background


Trending on Mashable
NYT Connections today: See hints and answers for April 25
A phone displaying the New York Times game 'Connections.'

Wordle today: Here's the answer and hints for April 25
a phone displaying Wordle

NYT's The Mini crossword answers for April 25
Closeup view of crossword puzzle clues

NYT Connections today: See hints and answers for April 24
A phone displaying the New York Times game 'Connections.'

The biggest stories of the day delivered to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
Thanks for signing up. See you at your inbox!