New Exploit: Malware Hidden Inside JPG EXIF Headers | Islandnet Blog
For support call:     778-410-2454

New Exploit: Malware Hidden Inside JPG EXIF Headers

A few days ago, Peter Gramantik from Securi's research team found a very interesting backdoor on a compromised site. This backdoor didn’t rely on the normal patterns to hide its content (like base64/gzip encoding), but stored its data in the EXIF headers of a JPEG image. It also used the exif_read_data and preg_replace PHP functions to read the headers and execute itself.

Read More here. 

We run ClamAV to scan account files on Islandnet.com upon request,  I will be contacting them to see if they are going to implement anything in the scanner to check for this type of exploit.