Can hackers hide virus in photo?
Is this possible?
The answer is Yes….! This is Possible.
Hacker, The name itself stuns us. Because they are worse, Just like some of our Policemen and many of our Politicians. Well, The link is hard.
Now let us see that how do hackers hide virus in the picture or photo.
Table of contents
How do the hackers hide a virus in the photo?
- Initially, They Create a folder
- Adds a Picture / Photo and that virus file into that folder.
- They convert that picture into an icon.
- Now they archive that folder of photo and virus.
- They do some alterations in the parameters of that archive. I did not explain this step because some readers may misuse this.
- Now they convert that into an executable .exe file
- They change the order of the launch in that file by aligning the photo to appear as first followed by the virus file.
- Now they alter some options in the mode tab.
- In the “text and graphics”, tab they replace that ‘archive icon’ with their photo icon.
- Now the .exe file is ready.
- They do some rename process, and I do not explain that. Now the virus is hidden in the photo.
Now that .exe file appears like the photo. Hackers insert or send these files annonymously to their targets.
That file appears like the photo to the target, and when the target clicks that file….. BOOM…!. The virus starts its action in the background. And these come under Trojan Category.
This page is just for the information purpose only.
What is a Computer Virus?
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
The term ‘computer virus’ was first formally defined by Fred Cohen in 1983.
Computer viruses never occur simply. They are always created by Cybermen. Once formed and released, however, their spread is not directly under human control.
After entering a computer, a virus connects itself to another program in such a way that the execution of the host program triggers the action of the virus concurrently.
It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are harmful though.
However, most of them perform actions that are malicious in nature, such as destroying data.
Some viruses wreak devastation as soon as their code is executed, while others lie inert until an odd event (as programmed) gets initiated, which causes their code to run in the computer.
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments.
Some viruses use different stealth strategies to avoid their detection from anti-virus software.
For example, some can infect files without extending their sizes, while others try to evade detection by killing the tasks connected with the antivirus software before they can be detected.
Some old viruses make sure that the “last modified” date of a host file stays the same when they infect the file.
How to secure yourself from all these attacks?
- Do not click on unknown links on the internet.
- Use Good Anti-Virus and defender tools.
- Do not use unknown software.
- Don’t use Cracked, Modded, or Nulled software.
- Browse HTTPS websites over HTTP sites.
- Don’t use pirated software and OS
- Do not browse on unknown Browsers and unknown websites.
- Be alert while downloading a file. Hackers insert files through ads.
Thanks for reading.