Keldrin writes:
"Zeus is a trojan designed to steal banking credentials, and has been declared one of the most successful pieces of malware currently seen in the wild. A new variant is making detection far more difficult for anti-virus companies by hiding configuration settings inside pictures. At the moment, the malware simply encodes the configuration with Base64, passes them through XOR and RC4, then attaches them to the end of an image file. This makes for an 'infected' file that is much larger than the original. There is speculation that future releases of the malware will be able to detect minuscule changes to the colors of individual pixels, making the affected files much harder to detect."
(Score: 2, Informative) by Fnord666 on Friday February 21 2014, @10:54PM
The key for the steganography can tell you where the next bit in the encoded message is located within the image. To encode you replace the lower order bit at that location with your next payload bit. To decode you just grab the low order bit at that location. No need to have the original image to compare against. In fact it's better if the original image is not available so that a cryptanalyst doesn't have it available as a crib.