Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems

Posted on August 7, 2025August 8, 2025 By CWS

Cybercriminals have begun exploiting Scalable Vector Graphics (SVG) information as subtle assault vectors, remodeling seemingly innocent picture information into potent phishing weapons able to executing malicious JavaScript on Home windows methods.

This rising risk leverages the XML-based construction of SVG information to embed and execute malicious scripts when opened in default internet browsers, bypassing conventional safety measures that usually concentrate on typical executable information.

In contrast to customary picture codecs akin to JPEG or PNG that retailer pixel information, SVG information make the most of XML-based code to outline vector paths, shapes, and textual content components.

This basic distinction creates a chance for attackers to embed JavaScript code inside the file construction, which executes mechanically when the SVG file is opened in a browser.

The assault primarily targets Home windows methods the place SVG information launch in default internet browsers, enabling instant script execution with out consumer intervention past opening the file.

Seqrite safety researchers have recognized a complicated marketing campaign using this system, observing attackers distributing malicious SVG information by way of spear-phishing emails with misleading topic strains like “Reminder in your Scheduled Occasion” and attachments named “Upcoming Assembly.svg” or “Your-to-do-Listing.svg.”

Assault chain of SVG marketing campaign (Supply – Seqrite)

The marketing campaign additionally makes use of cloud storage platforms together with Dropbox, Google Drive, and OneDrive to distribute malicious information whereas evading electronic mail safety filters.

The assault demonstrates outstanding technical sophistication, with risk actors leveraging a number of evasion methods to keep up persistence and keep away from detection by conventional safety options.

Technical An infection Mechanism and Code Obfuscation

The malicious SVG information include embedded “ tags inside CDATA sections to hide malicious logic from primary content material scanners. Safety researchers found that attackers make use of a hex-encoded string variable (Y) paired with a brief XOR key (q) for payload obfuscation.

When processed, this encoded information decrypts into executable JavaScript that makes use of window.location = ‘javascript:’ + v; syntax to redirect victims to phishing websites.

Upon profitable decryption, the payload redirects customers to command-and-control infrastructure, particularly hxxps://hju[.]yxfbynit[.]es/koRfAEHVFeQZ!bM9, which employs Cloudflare CAPTCHA gates earlier than presenting convincing Workplace 365 login types designed for credential harvesting.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Embedded, Execute, Files, Hackers, JavaScript, Malicious, Malware, SVG, Systems, Weaponizing, Windows

Post navigation

Previous Post: Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
Next Post: How to Secure Docker Containers

Related Posts

Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Cyber Security News
Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Cyber Security News
GitHub Copilot and Visual Studio Vulnerabilities Allow Attacker to Bypass Security Feature Cyber Security News
Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues Cyber Security News
Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
  • 3 Ways to Protect Your Business in 2026
  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • What 2025 Taught Us About Modern Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
  • 3 Ways to Protect Your Business in 2026
  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • What 2025 Taught Us About Modern Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark