Threat Actors Using Weaponized SVG Files to Redirect Users to Malicious Websites

According to their analysis, these malicious SVG files frequently appear as seemingly harmless email attachments that trigger no alerts from traditional security solutions. A particularly concerning trend involves the weaponization of Scalable Vector Graphics (SVG) files, which are being embedded with malicious JavaScript code designed to redirect unsuspecting users to credential-harvesting websites. “The flexibility of SVG files makes them an ideal candidate for evading security filters, as many security solutions do not deeply inspect SVG files for embedded JavaScript,” the research team reported. In multiple documented cases, malicious SVG files received zero detections on VirusTotal, allowing them to reach intended victims without triggering security alerts. These attacks exploit the inherent flexibility of SVG files while evading traditional detection mechanisms, allowing threat actors to successfully deliver phishing payloads to user inboxes. Phishing campaigns have evolved significantly in 2025, with threat actors increasingly leveraging unconventional file formats to bypass security solutions. Their research depicts the need for deeper inspection of unconventional file formats and highlights how SVG files have become an increasingly common attack vector in the cybersecurity landscape of 2025. Unlike traditional image formats, SVG files support embedded scripts, hyperlinks, and interactive elements, making them particularly versatile for both legitimate use and malicious exploitation. Intezer researchers noted a significant increase in SVG-based attacks throughout early 2025, documenting multiple instances where these weaponized files successfully bypassed email protections. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. When analyzing sample file b5a7406d5b4ef47a62b8dd1e4bec7f1812162433955e3a5b750cc471cbfad93e, Intezer researchers discovered an intricate multi-step obfuscation pattern designed to evade detection. The script employs multiple layers of protection: string reversal, strategic insertion of junk characters that are programmatically removed, hexadecimal-to-ASCII conversion through a mathematical formula, and finally, URL reconstruction that redirects victims to a credential-harvesting page. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. This detection gap represents a significant blind spot in current email and endpoint security solutions. What makes this technique particularly effective is the multi-layered obfuscation that conceals the malicious payload from static analysis engines. When a victim opens the SVG file, the encoded script executes, decodes itself, and silently redirects the user to a phishing site designed to harvest credentials. This complex approach ensures that traditional static analysis tools cannot easily identify the malicious behavior. SVG files, commonly used for legitimate web graphics purposes, are XML-based formats capable of rendering two-dimensional graphics.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Apr 2025 09:00:13 +0000


Cyber News related to Threat Actors Using Weaponized SVG Files to Redirect Users to Malicious Websites

Threat Actors Using Weaponized SVG Files to Redirect Users to Malicious Websites - According to their analysis, these malicious SVG files frequently appear as seemingly harmless email attachments that trigger no alerts from traditional security solutions. A particularly concerning trend involves the weaponization of Scalable Vector ...
6 months ago Cybersecuritynews.com
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
1 year ago Microsoft.com Kimsuky
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 months ago Cybersecuritynews.com
Threat actors misuse OAuth applications to automate financially driven attacks - Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious ...
1 year ago Microsoft.com
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
1 year ago Feeds.fortinet.com CVE-2023-42793 APT29
Operation Morpheus took down 593 Cobalt Strike servers used by threat actors - Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Experts released PoC exploit code for a critical bug in Progress Telerik Report Servers. Threat actors may have exploited a zero-day in older iPhones, Apple warns. Nation-state ...
1 year ago Securityaffairs.com CVE-2024-0769 CVE-2022-38028 CVE-2023-49103 CVE-2023-46747 CVE-2023-46748 CVE-2023-4966 APT28
What is SEO Poisoning Attack? - Search engine optimization (SEO) poisoning is a type of cyber attack that infiltrates search results. It consists of malicious search engine results created by an attacker attempting to redirect someone to malicious or vulnerable webpages. It is a ...
2 years ago Heimdalsecurity.com
New Phishing Attack Appending Weaponized HTML Files Inside SVG Files - When opened, these files execute their embedded code, either displaying an HTML page with deceptive content or using JavaScript to redirect victims to sophisticated phishing sites that mimic legitimate services like Google Voice or Microsoft login ...
6 months ago Cybersecuritynews.com
SVG Security Analysis Toolkit: Enhancing Cyber Defense with Advanced Tools - The SVG Security Analysis Toolkit is a comprehensive suite designed to enhance cybersecurity defenses by analyzing and mitigating threats embedded within SVG files. As SVG files are widely used for vector graphics on the web, they have become a ...
1 month ago Cybersecuritynews.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
8 months ago Cybersecuritynews.com
CISA: AWS, Microsoft 365 Accounts Under Active 'Androxgh0st' Attack - The FBI and the US Cybersecurity and Infrastructure Security Agency have issued an alert about a malware campaign targeting Apache webservers and websites using the popular Laravel Web application framework, leveraging known bugs for initial ...
1 year ago Darkreading.com CVE-2017-9841 CVE-2021-41773
SIEM agent being used in SilentCryptoMiner attacks | Securelist - The most interesting action in this attack was the implementation of unusual techniques like using an SIEM agent as backdoor, adding the malicious payload to a legitimate digital signature, and hiding directories containing malicious files. The ...
1 year ago Securelist.com
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours - In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol host, leading to data exfiltration and the deployment of Trigona ransomware. On Christmas Eve, within just three hours of gaining initial access, ...
1 year ago Thedfirreport.com Trigona
Financially motivated threat actors misusing App Installer - Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme to distribute malware. In ...
1 year ago Microsoft.com Black Basta
Microsoft Outlook stops displaying inline SVG images used in attacks - Microsoft has implemented a security enhancement in Outlook by disabling the display of inline SVG images. This change aims to mitigate attacks that exploit SVG images to deliver malicious payloads or execute harmful scripts within emails. SVG ...
1 month ago Bleepingcomputer.com
How to Overcome the Most Common Challenges with Threat Intelligence - Today's typical approach to threat intelligence isn't putting organizations in a place to do that. Instead, many threat intelligence tools are delivering too much uncurated and irrelevant information that arrives too late to act upon. Organizations ...
1 year ago Cyberdefensemagazine.com Hunters
Automating Threat Intelligence Enrichment In Your SIEM With MISP - In conclusion, automating threat intelligence enrichment between MISP and your SIEM using Python is a transformative step for any security operations center. This article explores how to architect, implement, and operationalize automated threat ...
6 months ago Cybersecuritynews.com
New Wave of 'Anatsa' Banking Trojans Targets Android Users in Europe - The campaign has been ongoing for at least four months and is the latest salvo from the operators of the malware, which first surfaced in 2020 and has previously notched victims in the US, Italy, United Kingdom, France, Germany, and other countries. ...
1 year ago Darkreading.com
What Is Cyber Threat Hunting? - Cyber threat hunting involves proactively searching for threats on an organization's network that are unknown to traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring ...
1 year ago Techrepublic.com
What Is Threat Modeling? - Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address potential security threats. Threat Modeling Adoption and Implementation The successful adoption of threat modeling within ...
1 year ago Feeds.dzone.com
Top 7 Cyber Threat Hunting Tools for 2024 - Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. With ...
1 year ago Techrepublic.com
'Ov3r Stealer' Malware Spreads Through Facebook to Steal Crates of Info - The malware by design exfiltrates specific types of data such as geolocation, hardware info, passwords, cookies, credit card information, auto-fills, browser extensions, crypto wallets, Office documents, and antivirus product information, according ...
1 year ago Darkreading.com
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies - Critical for organizations to understand attackers' tactics, techniques, and procedures. The 2023 mid-year cyber threat report card portends an ominous outlook with staggering data including the fact that 332 million cryptojacking attacks were ...
1 year ago Cyberdefensemagazine.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
7 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)