Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems

Posted on August 7, 2025August 8, 2025 By CWS

Cybercriminals have begun exploiting Scalable Vector Graphics (SVG) information as subtle assault vectors, remodeling seemingly innocent picture information into potent phishing weapons able to executing malicious JavaScript on Home windows methods.

This rising risk leverages the XML-based construction of SVG information to embed and execute malicious scripts when opened in default internet browsers, bypassing conventional safety measures that usually concentrate on typical executable information.

In contrast to customary picture codecs akin to JPEG or PNG that retailer pixel information, SVG information make the most of XML-based code to outline vector paths, shapes, and textual content components.

This basic distinction creates a chance for attackers to embed JavaScript code inside the file construction, which executes mechanically when the SVG file is opened in a browser.

The assault primarily targets Home windows methods the place SVG information launch in default internet browsers, enabling instant script execution with out consumer intervention past opening the file.

Seqrite safety researchers have recognized a complicated marketing campaign using this system, observing attackers distributing malicious SVG information by way of spear-phishing emails with misleading topic strains like “Reminder in your Scheduled Occasion” and attachments named “Upcoming Assembly.svg” or “Your-to-do-Listing.svg.”

Assault chain of SVG marketing campaign (Supply – Seqrite)

The marketing campaign additionally makes use of cloud storage platforms together with Dropbox, Google Drive, and OneDrive to distribute malicious information whereas evading electronic mail safety filters.

The assault demonstrates outstanding technical sophistication, with risk actors leveraging a number of evasion methods to keep up persistence and keep away from detection by conventional safety options.

Technical An infection Mechanism and Code Obfuscation

The malicious SVG information include embedded “ tags inside CDATA sections to hide malicious logic from primary content material scanners. Safety researchers found that attackers make use of a hex-encoded string variable (Y) paired with a brief XOR key (q) for payload obfuscation.

When processed, this encoded information decrypts into executable JavaScript that makes use of window.location = ‘javascript:’ + v; syntax to redirect victims to phishing websites.

Upon profitable decryption, the payload redirects customers to command-and-control infrastructure, particularly hxxps://hju[.]yxfbynit[.]es/koRfAEHVFeQZ!bM9, which employs Cloudflare CAPTCHA gates earlier than presenting convincing Workplace 365 login types designed for credential harvesting.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Embedded, Execute, Files, Hackers, JavaScript, Malicious, Malware, SVG, Systems, Weaponizing, Windows

Post navigation

Previous Post: Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
Next Post: How to Secure Docker Containers

Related Posts

Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine Cyber Security News
Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
VMware Cloud Foundation 9.0 Released With Modern Workloads & AI Services Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News
Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News