Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize SVG Files and Office Documents to Target Windows Users

Hackers Weaponize SVG Files and Office Documents to Target Windows Users

Posted on December 20, 2025December 20, 2025 By CWS

Cybersecurity researchers have uncovered a complicated e-mail marketing campaign deploying a commodity loader to distribute Distant Entry Trojans and data stealers.

The operation primarily targets manufacturing and authorities organizations throughout Italy, Finland, and Saudi Arabia, utilizing extremely evasive methods.

An infection chain

Multi-Vector Assault Technique

The marketing campaign employs a number of an infection strategies to compromise Home windows techniques. Risk actors are distributing weaponized Microsoft Workplace paperwork that exploit CVE-2017-11882, a vital reminiscence corruption vulnerability within the Equation Editor part.

Moreover, attackers leverage malicious SVG information and ZIP archives containing LNK shortcuts, all converging on a unified commodity loader infrastructure.

E mail with attachment

The assaults start with focused phishing emails masquerading as respectable Buy Order communications from enterprise companions.

These misleading messages comprise RAR archives hiding first-stage JavaScript payloads designed to bypass preliminary safety screening.

The malware operates by way of a complicated four-stage execution pipeline engineered to evade detection.

The preliminary JavaScript file incorporates closely obfuscated code that dynamically reconstructs malicious strings utilizing break up and be part of operations. Upon execution, it creates a hidden PowerShell course of utilizing Home windows Administration Instrumentation objects.

Courses current in Clear Job Scheduler (left) appended malicious content material (proper)

The second stage retrieves a malicious PNG picture from respectable internet hosting providers similar to Archive.org.

This picture incorporates steganographically embedded base64-encoded .NET assemblies hidden on the finish of the file. The PowerShell script extracts this payload utilizing a daily expression. It masses it instantly into reminiscence with out writing to disk.

Within the third stage, attackers weaponize the respectable open-source TaskScheduler library from GitHub.

By appending malicious features to the supply code and recompiling it, they create a trojanized meeting that retains an genuine look whereas embedding malicious capabilities.

The ultimate stage employs course of injection methods, making a suspended RegAsm.exe course of and injecting the decoded payload into its reminiscence house.

This course of hollowing permits malware to masquerade as respectable Home windows utilities whereas executing malicious code.

Payload Supply and Capabilities

The marketing campaign delivers numerous information-stealing instruments and RATs, together with PureLog Stealer, Katz Stealer, DC Rat, Async Rat, and Remcos.

The PureLog Stealer payload is decrypted utilizing Triple DES encryption in CBC mode earlier than being invoked to exfiltrate delicate knowledge, together with browser credentials, cryptocurrency pockets data, and complete system particulars.

Injecting payload into RegAsm.exe

Researchers at Cyble Analysis and Intelligence Labs (CRIL) recognized a novel Consumer Account Management (UAC) bypass approach through which malware screens system process-creation occasions and opportunistically triggers UAC prompts throughout respectable launches, tricking customers into granting elevated privileges.

Cross-campaign evaluation reveals standardized methodology throughout a number of risk actors, suggesting the loader operates as a shared supply framework.

Analysis from Seqrite, Nextron Techniques, and Zscaler documented similar class naming conventions and execution patterns throughout numerous malware households, confirming the widespread availability of this infrastructure.

Organizations ought to implement enhanced e-mail filtering, disable legacy Workplace equation editor elements, scrutinize picture attachments, and monitor for suspicious PowerShell exercise to mitigate these subtle threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Documents, Files, Hackers, Office, SVG, Target, Users, Weaponize, Windows

Post navigation

Previous Post: Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
Next Post: CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware

Related Posts

CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks Cyber Security News
Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Cyber Security News
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Cyber Security News
PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Cyber Security News
Apache Struts 2 DoS Vulnerability Let Attackers Crash Server Apache Struts 2 DoS Vulnerability Let Attackers Crash Server Cyber Security News
Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Eclipse Foundation Enhances Security for VS Code Extensions
  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Eclipse Foundation Enhances Security for VS Code Extensions
  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark