Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript
Score: 66/100
4 articles
100.0% Similarity
2 days ago
Activity Timeline
How phishers are weaponizing SVG images in zero-cl...
CSO Online
Jul 15
13:00
Threat Actors Use SVG Smuggling for Browser-Native...
SecurityWeek
Jul 15
14:33
Weaponizing SVG: How Threat Actors Embed Malicious...
GB Hackers
Jul 17
07:58
Threat Actors Weaponizing SVG Files to Embed Malic...
Cybersecurity News
Primary Article
Jul 17
09:05
Primary Article
Cybersecurity News 14 hours ago
Threat actors are quietly turning Scalable Vector Graphics (SVG) files into precision-guided malware. In a surge of phishing campaigns, seemingly innocuous.svgattachments slip past secure email gateways because mail filters regard them as static images.
Once the recipient merely previews the file, hidden JavaScript executes inside the browser, triggering an invisible redirect chain that funnels victims to attacker infrastructure.
The lure emails are minimalist—often a single icon or“Missed Call”teaser—and exploit organisations that have weak SPF, DKIM or DMARC enforcement.
As the attachments bypass signature checks, the first line of defence fails; Ontinue analystsidentifiedthe wave after correlating near-identical SVGs sent to B2B service providers and SaaS vendors, all containing distinct Base64 tracking strings that map each click to a workstation.
Since no executable is dropped, endpoint agents see only normal browser activity while credentials are siphoned off on well-crafted Micr...
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Unlock Cluster AI
Join ThreatCluster Intelligence to access AI-generated executive, technical, and remediation briefs.
Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files
Cybersecurity researchers have identified an emerging attack campaign where threat actors are weaponizing Scalable Vector ...
Ontinue warns of a newly observed phishing campaign leveraging Scalable Vector Graphics (SVG) files in redirect attacks that evade traditional detection.While considered harmless image formats, SVG fi...
Seemingly harmless SVGs are packed with malicious JavaScript for a phishing redirect to actor-controlled URLs.
Threat actors are shifting from conventional phishing tricks, which used malicious links ...
Save to Folder
Choose a folder to save this cluster:
We use cookies
We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.
Cookie Settings
Essential Cookies
Required for the website to function. Cannot be disabled.
Session management and authentication
Security and fraud prevention
Cookie consent preferences
Analytics Cookies
Help us understand how visitors interact with our website.