Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Posted on July 15, 2025July 15, 2025 By CWS

Ontinue warns of a newly noticed phishing marketing campaign leveraging Scalable Vector Graphics (SVG) information in redirect assaults that evade conventional detection.

Whereas thought of innocent picture codecs, SVG information can comprise embedded scripts, and menace actors have been abusing this to inject obfuscated JavaScript code resulting in browser redirects at runtime.

The malicious code is hidden inside a CDATA part of the SVG file and depends on a static XOR key to decrypt a payload at runtime. The decrypted code reconstructs a redirect command and builds a vacation spot URL that additionally incorporates monitoring performance.

“JavaScript execution is achieved with out requiring file drops or macros, and evasion is additional enhanced by distributing the payload through spoofed emails that will move fundamental anti-spam filters,” Ontinue says.

The malicious SVG information are delivered through phishing emails that use domains with weak or misconfigured DKIM, DMARC, and SPF information, permitting the attackers to impersonate the sender. In some instances, the attackers have used domains like these of respectable entities.

The messages sometimes have landed in inboxes missing DKIM information and DMARC insurance policies. The noticed emails are minimalistic, with solely a number of strains within the physique, instructing the sufferer to preview the picture within the browser. The SVG file is both delivered as an attachment or hosted externally, and a hyperlink to it’s included within the message.

As a part of the marketing campaign, the attackers used domains with a randomized or subdomain-based construction, to hinder static-filtering detection. The domains have low or unknown status and look like rotated repeatedly.

The assaults primarily focused B2B service suppliers, comparable to monetary and worker companies corporations, utilities, and software-as-a-service suppliers, which deal with priceless company knowledge repeatedly.Commercial. Scroll to proceed studying.

The usage of SVG smuggling in these focused phishing campaigns permits attackers to evade conventional behavioral or signature-based detection, because the embedded script logic triggers the redirection straight within the browser, with out person interplay or exterior downloads.

“This marketing campaign stands out for its use of browser-native redirection with out requiring person interplay or exterior downloads. It bridges the hole between conventional phishing and full malware supply, making it stealthy and efficient,” Ontinue notes.

In response to Sectigo senior fellow Jason Soroko, to mitigate these assaults, defenders have to deal with content material the identical means they deal with code. 

“Deal with each inbound SVG as a possible executable. Strip or block script tags. Implement strict DMARC alignment and auto purge questionable mail. Instrument telemetry to catch browser pivots triggered by window location adjustments that originate from picture previews. Layered controls, like Protected Hyperlinks content material disarmament, and lookalike area monitoring, will disrupt the straightforward path attackers now depend on,” Soroko stated.

Associated: Google Gemini Tricked Into Displaying Phishing Message Hidden in E-mail

Associated: 13 Romanians Arrested for Phishing the UK’s Tax Service

Associated: Microsoft 365 Direct Ship Abused for Phishing

Associated: SMTP Smuggling Permits Spoofed Emails to Bypass Authentication Protocols

Security Week News Tags:Actors, BrowserNative, Redirection, Smuggling, SVG, Threat

Post navigation

Previous Post: GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality
Next Post: Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack

Related Posts

Cyera Raises $540 Million to Expand AI-Powered Data Security Platform Security Week News
Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’  Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Rowhammer Attack Demonstrated Against Nvidia GPU Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network
  • Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network
  • Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News