StegoEnterprise™

StegoEnterprise is a command line Linux application that scans specified directories containing files to examine, and generates a report for each scanned file. StegoEnterprise is simple to use and requires a minimal amount of technical knowledge. StegoEnterprise builds upon the capabilities of the industry-leading Steganography detection and steganalysis software tool, StegoHunt. Like its Windows-based predecessor, StegoEnterprise uses a collection of detection algorithms to quickly identify the presence of steganography in suspect carrier files.

Use cases for StegoEnterprise include: acceptable use policy enforcement, forensic investigations, data breach response, data leak analysis, insider threat identification, and mobile device examination.


STEGANOGRAPHY DETECTION ACROSS THE BOARD


StegoCommand supports several “out-of-the-box” file types for scanning for the presence of steganography. In addition to the “out-of-the-box” file types offered, the WetStone Technologies research and development team can work directly with a customer to expand the capabilities to scan for steganography in unique, custom, proprietary or industry-specific file types.

StegoCommand has the ability to traverse an unlimited number of nested archive files. Nested archives are often used in an attempt to conceal the presence of data hiding. With StegoCommand, users can be assured that all files in an archive file will be analyzed for the presence of hidden data.


FEATURES OF STEGOENTERPRISE


StegoCommand detects and provides comprehensive reports on:

  • statistical anomalies
  • structural anomalies
  • the presence of misplaced binary or UTF-8 data
  • data appending
  • data prepending
  • file name obfuscation
  • the presence of unusual Unicode data
  • Comprehensive reporting

StegoCommand is:

  • Easily deployed in either on-premise or cloud-based environments
  • Scalable to support analysis of very large files and very large data repositories
  • Invoked via a command prompt or PowerShell

FILE TYPES SUPPORTED


  • JPEG
  • BMP
  • GIF
  • PNG
  • WAV
  • MP3
  • JPEG 2000
  • TIFF
  • PCX
  • 3GP
  • M4V
  • 7z
  • M4A
  • MOV
  • MP4
  • AVI
  • FLV
  • MPG
  • ASF
  • OLE (.doc, .ppt, .xls, etc)
  • Office files (.docx, .pptx, .xlsx, etc)
  • PDF
  • ZIP
  • TAR

SUPPORTED PLATFORMS


  • Ubuntu
  • Red Hat Enterprise Linux version 7

WetStone can work directly with a customer to support additional operating systems.


SYSTEM REQUIREMENTS


  • Computer system or virtual machine must meet or exceed the minimum requirements of 4GB RAM and 4 Core Processor.

Financial Institution's Data Transfer. A major bank receives third-party data related to customer transaction history, market trends, and various financial reports. To ensure that no hidden malicious content infiltrates their networks and compromises customer data, the bank uses StegoEnterprise. By doing so, they maintain data integrity, keep their customers' financial information safe, and avoid potential regulatory sanctions.

Government Agency Monitoring Intelligence Feed. A government intelligence agency regularly receives large volumes of multimedia data feeds from a variety of sources. Given the sensitive nature of their operations, they cannot risk a malicious actor using steganography to infiltrate their systems. They implement StegoEnterprise to scrutinize every incoming data feed. As a result, they're able to detect, quarantine, and further analyze any file suspected of containing steganographic content, keeping their networks and intelligence secure.