Threat Actors Use SVG Smuggling for Browser-Native Redirection

Threat Actors Use SVG Smuggling for Browser-Native Redirection
Ontinue warns of a newly observed phishing campaign leveraging Scalable Vector Graphics (SVG) files in redirect attacks that evade traditional detection.While considered harmless image formats, SVG files can contain embedded scripts, and threat actors have been abusing this to inject obfuscated JavaScript code leading to browser redirects at runtime.The malicious code is hidden within a CDATA section of the SVG file and relies on a static XOR key to decrypt a payload at runtime. The decrypted co...

Save to Folder

Choose a folder to save this article: