Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all…