• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

    Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87
  • Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139

    Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139
  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to restore information in an edited screenshot

Mar 28, 2023 by iHash Leave a Comment


You might think that hiding sensitive information in a picture is a cakewalk. Just blot out your secrets with a big black marker in any image editor. Or even better: just crop the bit of the photo or screenshot that contains your personal data. What could possibly go wrong?

Quite a lot, in fact. We’ve already posted about how not to hide information in images and how not to retouch pictures embedded in documents. But a recent study shows that you can still come a cropper, so to speak, even if you take just about every conceivable precaution — and all due to a bug related to image processing. Let’s take a closer look at how two standard image-editing tools — one on Google Pixel and the other in Windows 11 — can reveal supposedly hidden information in images.

How to recover hidden information in screenshots edited on Google Pixel

It all started when security researchers Simon Aarons and David Buchanan discovered a vulnerability they named Acropalypse: it turns out that Markup, the Google Pixel built-in image editor, saves edited PNG files in a way that lets them be fully or partially recovered.

When processing PNG images, instead of saving a completely new PNG file, Markup overwrites the old one in a very peculiar way. If you crop a picture, its size in bytes compared to the original decreases, of course. The same thing happens if you paint over part of an image with a single color — thanks to the compression algorithms that are very good at packing solid-colored areas. But the file saved after editing in Markup has the same size as the original: the app simply overwrites the new data on top of the old, leaving a “tail” of the initial image data in the file. And with the help of a tool created by the researchers (available online), it’s possible to partially restore the original.

Here’s how the researchers themselves illustrate what’s going on:

Illustration of the concept behind the Acropalypse vulnerability

Recovery of an image edited with Google Pixel Markup. Source

Note, though, that the screenshot used as the example here is both redacted AND cropped. Thus, importantly, the resulting image is significantly smaller than the original. After the edited version is saved on top of the original, there’s a lot of non-overwritten data at the end of the file that can be recovered. And the fully unrestored or badly-restored area — the top third of the resulting picture — just so happens to contain nothing important.

So the researchers’ demonstration should be taken as an ideal case: in real life, the success of the tool will almost certainly be lower, and the result will largely depend on the circumstances. But that doesn’t mean the problem can be ignored — this vulnerability is nothing if not very unpleasant.

It affects the following Google smartphones (highlighted are models that are no longer supported and will probably not get updates):

  • Google Pixel 3, 3 XL, 3a, 3a XL
  • Google Pixel 4, 4 XL, 4a, 4a(5G)
  • Google Pixel 5, 5a
  • Google Pixel 6, 6 Pro, 6a
  • Google Pixel 7, 7 Pro

In addition to its colloquial name, Acropalypse, the vulnerability was designated CVE-2023-21036. It has already been patched in the March Android update for the Pixel smartphones. Alas, the update is powerless to fix old edited screenshots that have already been published or otherwise shared.

How to recover hidden information in screenshots edited in Windows 11

After Aarons and Buchanan posted their findings on Twitter, other researchers took up the cause. Logically assuming that other image-editing tools might use the same flawed mechanism for overwriting PNG files, they began to look for new vulnerable applications. And they found them, of course: a similar bug was detected in Snipping Tool, a screenshot utility in Windows 11.

Windows 11 Snipping Tool has exactly the same problem: the app overwrites edited PNG files on top of the original, and when the new file is smaller, some data from the original remains at the end of the file, from which the uncut image can be partially reconstructed.

See this article on BleepingComputer for more details:

Acropalypse vulnerability in Windows 11 Snipping Tool

Recovery of an image edited with Windows 11 Snipping Tool. Source

Although in this case a smaller part of the original image was restored, the result is still impressive. Note that the problem seems to be confined only to Snipping Tool and only to the Windows 11 version. So users of earlier versions of Windows, or those who prefer to edit screenshots in Paint or a full-fledged graphics editor like Photoshop, aren’t affected.

The vulnerability in Windows 11 Snipping Tool remains unclosed. But, again, even when an update arrives, it won’t fix the problem with screenshots that are already out there.

What to do?

If you use Windows 11 Snipping Tool, or have a Google Pixel smartphone (gen 3–7), and you’ve posted cropped or edited screenshots with passwords somewhere, consider those passwords compromised: change them immediately. Sure, you might struggle to remember every such instance, and in any case there’s nothing much you can do about it: there do exist Python scripts and YARA rules for finding and treating such PNG images, but these are only for techies.

On a final note, here are some tips on how to safely retouch images with sensitive data that you plan to post online or send to someone you don’t know if you can fully trust:

  • If you prefer to hide your secrets by painting over them or filling the area with solid color, make sure that the opacity is set to 100%.
  • If you opt for pixelating or smearing, bear in mind that this operation is reversible.
  • If you’re cropping, save the image to a new file — preferably using Photoshop’s Save for Web tool or an equivalent: such a tool will definitely slice off the unwanted part of the file for the sake of optimization.

Lastly, before posting a picture that could spill a bean or two, ask yourself: is posting it really necessary?





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: edited, Information, Restore, screenshot

Special Offers

  • Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

    Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87
  • Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139

    Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139
  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

AI Empowers Microfinance: Revolutionizing Fraud Detection

Jun 1, 2023 By iHash

Apple, MLB announce July “Friday Night Baseball” schedule on Apple TV+

Jun 1, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

A Guide to Log File Parsing Tools

A Guide to Log File Parsing Tools

While log parsing isn’t very sexy and never gets much credit, it is fundamental to productive and centralized log analysis. Log parsing extracts information in your logs and organizes them into fields. Without well-structured fields in your logs, searching and visualizing your log data is near impossible. In this article, we’ll review some of the […]

Triangulation: Trojan for iOS

Triangulation: Trojan for iOS | Kaspersky official blog

Hi all, today we have very big and important news. Kaspersky experts have discovered an extremely complex, professionally targeted cyberattack that uses Apple’s mobile devices. The purpose of this attack is the inconspicuous introduction of spyware into the iPhones of employees of the company – both top and middle-management. The attack is carried out using […]

Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

Expires June 01, 2123 23:59 PST Buy now and get 37% off KEY FEATURES The Apple iPad Mini 2nd Gen is a compact, portable tablet with a powerful and versatile experience. Its 7.9-inch Retina display delivers vibrant visuals and sharp image quality. The Wi-Fi-only model ensures easy connectivity to wireless networks for browsing, streaming, and […]

Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks

May 31, 2023Ravie LakshmananAdvanced Persistent Threat The threat actor known as Dark Pink has been linked to five new attacks aimed at various entities in Belgium, Brunei, Indonesia, Thailand, and Vietnam between February 2022 and April 2023. This includes educational entities, government agencies, military bodies, and non-profit organizations, indicating the adversarial crew’s continued focus on […]

How to give back to the Elastic community

How to give back to the Elastic community

One of the most beautiful things about having a front-row seat in the Elastic Community is witnessing folks helping each other. From Discuss and the Elastic Community Slack workspace to the Official Elastic YouTube channel no matter where you turn, you’ll see Elasticsearch pros and beginners sharing their knowledge. That’s why we created the Elastic […]

Safeguards against firmware signed with stolen MSI keys

Safeguards against firmware signed with stolen MSI keys

What could be worse than a ransomware attack on your company? Only an incident that hits your company’s clients, I guess. Well, that’s exactly what happened to MSI — the large Taiwanese manufacturer of laptops, video adapters and motherboards. In the beginning of April, word got out that the company was attacked by a new […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT