New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

When opened, these files execute their embedded code, either displaying an HTML page with deceptive content or using JavaScript to redirect victims to sophisticated phishing sites that mimic legitimate services like Google Voice or Microsoft login portals. When examining a malicious SVG file in a text editor, security researchers discovered that many contain minimal vector graphics code, instead housing complete HTML documents or JavaScript redirection functions. Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver malicious HTML content to unsuspecting victims. The technique is particularly effective because the file maintains its “.svg” extension and is flagged as an image/svg+xml content type in email headers, allowing it to evade many attachment filtering systems that primarily block executable formats and traditional HTML attachments. This emerging threat, first observed at the beginning of 2025, represents a notable evolution in phishing tactics as attackers leverage the dual nature of SVG files to bypass security measures and trick users into revealing sensitive information. This legitimate feature, normally intended to enable interactive graphical elements, has become a vulnerability exploited by malicious actors who embed phishing pages or redirection scripts directly within what appears to be a harmless image attachment. This script-laden SVG, when opened in a web browser, executes immediately and either renders a convincing phishing page contained entirely within the file or launches a connection to an external malicious domain where credentials are harvested. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Securelist researchers identified a significant uptick in this attack methodology during March 2025, documenting 2,825 malicious emails utilizing SVG attachments in the first quarter alone. The upward trend has continued through April, with 1,324 incidents recorded in just the first half of the month—suggesting attackers are finding this technique increasingly effective against existing security measures. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Tushar is a Cyber security content editor with a passion for creating captivating and informative content.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 21 Apr 2025 15:45:15 +0000


Cyber News related to New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
5 months ago Cybersecuritynews.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
New Phishing Attack Appending Weaponized HTML Files Inside SVG Files - When opened, these files execute their embedded code, either displaying an HTML page with deceptive content or using JavaScript to redirect victims to sophisticated phishing sites that mimic legitimate services like Google Voice or Microsoft login ...
9 months ago Cybersecuritynews.com
Threat Actors Using Weaponized SVG Files to Redirect Users to Malicious Websites - According to their analysis, these malicious SVG files frequently appear as seemingly harmless email attachments that trigger no alerts from traditional security solutions. A particularly concerning trend involves the weaponization of Scalable Vector ...
9 months ago Cybersecuritynews.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
2 years ago Helpnetsecurity.com
Phishing kits now vet victims in real-time before stealing credentials - Even if they were allowed to use the real target's address, the analysts comment that some campaigns go a step further, sending a validation code or link to the victim's inbox after they enter a valid email on the phishing page. However, with this ...
9 months ago Bleepingcomputer.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
1 year ago Gbhackers.com
AI-Powered Phishing Detection - Does It Actually Work? - Unlike traditional methods that rely on identifying known threats, AI-powered systems analyze patterns and behaviors to detect anomalies indicative of phishing attempts. The rise of artificial intelligence (AI) has brought new hope to combating these ...
9 months ago Cybersecuritynews.com
SVG Security Analysis Toolkit: Enhancing Cyber Defense with Advanced Tools - The SVG Security Analysis Toolkit is a comprehensive suite designed to enhance cybersecurity defenses by analyzing and mitigating threats embedded within SVG files. As SVG files are widely used for vector graphics on the web, they have become a ...
3 months ago Cybersecuritynews.com
Phishing Campaign Exploits Open Redirection Vulnerability In 'Indeed.com' - Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around the world every day. Owing to the prevalence of the problem, Verizon's 2023 Data Breach ...
1 year ago Cyberdefensemagazine.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
1 year ago Hackread.com
5 Common Phishing Vectors and Examples - Phishing attacks can be executed through various means, such as SMS and phone calls, but the most prevalent method involves sending victims emails containing malicious attachments. Let's take a closer look at these types and examine examples of ...
1 year ago Cybersecuritynews.com CVE-2017-11882 Equation
Spotting Phishing Attacks with Image Verification Techniques - Phishing refers to the tactic used by scammers who impersonate reputable brands and lure victims to click on suspicious links so that they can breach the privacy and sensitive data of individuals. You can call image-based phishing a relatively ...
9 months ago Cybersecuritynews.com
Microsoft Outlook stops displaying inline SVG images used in attacks - Microsoft has implemented a security enhancement in Outlook by disabling the display of inline SVG images. This change aims to mitigate attacks that exploit SVG images to deliver malicious payloads or execute harmful scripts within emails. SVG ...
3 months ago Bleepingcomputer.com
How Businesses Prevent Credential Theft with Early Phishing Detection - By offering real-time, hands-on analysis, sandboxes give businesses the tools they need to stay one step ahead of evolving phishing attacks. Sandboxes like ANY.RUN offer real-time analysis, complete attack visibility, and tools that empower ...
6 months ago Cybersecuritynews.com
One Phish, Two Phish, Red Phish, Blue Phish - I sat down for a chat with George Skouroupathis, our phishing expert at Resonance Security. Phishing is often the first step taken by hackers in a larger scam. There are lots of different kinds of phishing attacks, but one of the most prevalent is ...
1 year ago Hackread.com
The age of weaponized LLMs is here - It's exactly what one researcher, Julian Hazell, was able to simulate, adding to a collection of studies that, altogether, signify a seismic shift in cyber threats: the era of weaponized LLMs is here. The research all adds up to one thing: LLMs are ...
2 years ago Venturebeat.com
Vade Releases 2023 Phishers' Favorites Report - PRESS RELEASE. SAN FRANCISCO, Feb. 15, 2024 /PRNewswire/ - Vade, a global leader in threat detection and response with more than 1.4 billion mailboxes protected, today announced its annual Phishers' Favorites report for 2023. Phishers' Favorites ...
1 year ago Darkreading.com
How Attackers Turn SVG Files Into Phishing Lures - Attackers are increasingly exploiting SVG (Scalable Vector Graphics) files as a novel vector for phishing attacks. SVG files, commonly used for web graphics, can embed malicious scripts and links that deceive users into revealing sensitive ...
2 months ago Cybersecuritynews.com
USPS Delivery Phishing Scam Exploits SaaS Providers to Steal Data - A new USPS Delivery Phishing Scam has surfaced, in which scammers are exploiting Freemium Dynamic DNS and SaaS Providers to steal victims' login credentials and other data. Cybersecurity researchers at Bloster AI have uncovered a new USPS Delivery ...
2 years ago Hackread.com
CVE-2023-50262 - Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to ...
2 years ago Tenable.com
CVE-2023-40013 - SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input ...
2 years ago
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
"Quishing" you a Happy Holiday Season - QR Code phishing scams - What they are and how to avoid them. Originally invented to keep track of car parts in the early 90s, QR codes have been around for decades. Quishing, or QR Code phishing, exploits smartphone users scanning the 2D barcode, ...
2 years ago Netcraft.com