Jason works in the sales and marketing department for a very large advertising agency located in
Atlanta. Jason is working on a very important marketing campaign for his company’s largest client.
Before the project could be completed and implemented, a competing advertising company comes
out with the exact same marketing materials and advertising, thus rendering all the work done for
Jason’s client unusable. Jason is questioned about this and says he has no idea how all the
material ended up in the hands of a competitor.
Without any proof, Jason’s company cannot do anything except move on. After working on
another high profile client for about a month, all the marketing and sales material again ends up in
the hands of another competitor and is released to the public before Jason’s company can finish
the project. Once again, Jason says that he had nothing to do with it and does not know how this
could have happened. Jason is given leave with pay until they can figure out what is going on.
Jason’s supervisor decides to go through his email and finds a number of emails that were sent to
the competitors that ended up with the marketing material. The only items in the emails were
attached jpg files, but nothing else. Jason’s supervisor opens the picture files, but cannot find
anything out of the ordinary with them.
What technique has Jason most likely used?
A.
Stealth Rootkit Technique
B.
ADS Streams Technique
C.
Snow Hiding Technique
D.
Image Steganography Technique
Ans: D
Image Steg = Hiding data in images.
A. Rootkit – Doesn’t make sense here. Malware.
B. ADS – type c:\somefil3.exe > c:\winnt\system32\calc.exe:somefil3.exe
C. Snow is a Steg technique that uses whitespace to hide secret messages.