What is steganography?
The word steganography is derived from the Greek steganos (hidden) and graphein (writing). Unlike cryptography, which disguises a message but signals its presence, steganography conceals data within ordinary files so observers remain unaware. Modern practitioners embed secret instructions in digital photos, videos or audio, taking advantage of tiny changes in pixels or sound samples that are imperceptible to human senses.
How digital steganography works
Least Significant Bit technique
Digital images store colour as numbers. A 24‑bit photo, for example, uses three bytes per pixel – red, green and blue. The least significant bit (LSB) in each byte can be flipped without noticeably changing the pixel. Attackers convert a message like “cat” into binary and replace the LSBs of successive pixels. Thousands of such bit tweaks across a picture can conceal a large payload while the picture appears identical to viewers.
{citationIndex='0' label='Diagram of Least Significant Bit embedding with bits of the word 'cat''}

Diagram showing the least significant bit steganography embedding the word 'cat' into an image's pixel data
Beyond images: other mediums and advanced methods

LSB embedding also works in audio and video. Sound samples and video frames can hide data by slightly changing amplitude or frequency, components. More advanced algorithms embed information in the frequency domain using transforms such as Fourier or cosine, and may encrypt the secret before hiding it. Because these methods preserve the file’s appearance or sound, even sophisticated scanners may not detect them.
The WhatsApp attack vector
WhatsApp and other messaging apps encourage users to share photos instantly, making them attractive delivery channels for steganographic malware. In the Jabalpur scam, an unsolicited image carried hidden code; when the victim opened it, the malware executed and drained around ₹2 lakh. According to India Today, the code was embedded inside common formats like .jpg and .png and silently installed after download, intercepting passwords and one‑time passwords. Traditional antivirus tools often miss such threats because the malicious content resides within image data rather than a separate executablei.

Why Steganographic attacks are effective
Steganography combines stealth with believability. Malware hidden in pictures does not look suspicious, so it can bypass user scrutiny and many filters. People trust images, especially when accompanied by an urgent story, and scammers exploit this trust through repeated calls or messages to persuade victims to open malicious files. Past incidents show that such malware can steal credentials and OTPs to drain bank accounts, and researchers have discovered web skimmers hidden in image metadata.
How to protect yourself
-
Disable auto‑downloads: Turn off automatic saving of images and videos in messaging apps so files do not arrive on your device without consent.
-
Avoid unknown media: Do not open media from strangers; block and report contacts who persistently urge you to view content.
-
Limit group invites: Restrict who can add you to groups to reduce exposure to unsolicited files.
-
Update and secure accounts: Keep your apps and operating system current and enable multi‑factor authentication to make account takeover more difficult.
-
Report incidents: If you fall victim or suspect a scam, report it to the cybercrime portal or authorities.
Conclusion
Steganography hides malware in plain sight by tweaking the least significant bits of images or by embedding code within audio and video files. The WhatsApp scam in Jabalpur shows how a single tap on a picture, coupled with social engineering, can lead to financial loss. To mitigate the risk, disable auto‑downloads, be wary of unsolicited media, keep your software updated and rely on multi‑factor authentication. A mix of awareness and basic precautions goes a long way toward preventing such hidden threats.
Written By
Aash Gates
Home Page