Don’t think of this ‘concealment methodology’ as somehow being a toy technology, steganography is a mature security tool with plenty to offer.
Here at IT Security Thing we are in no doubt that the use of steganography, or at least steganographic techniques in the broadest sense, will continue to be exploited by attackers for as long as there is a payoff in it. That payoff, be it hiding malware distribution, disguising command and control centre commands or obfuscating confidential and encrypted communications, is simply hiding all of the above in plain sight. So how do you defend against the steganography threat? Good question, and the best answer comes wrapped in the protective blanket of best practise that is a layered approach to security.