Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

How to Detect Hidden Redirects and Payloads

Posted on September 24, 2025September 24, 2025 By CWS

Phishing campaigns are getting tougher to identify, typically hiding in information you’d by no means suspect. ANY.RUN’s cybersecurity analysts just lately uncovered one such case: a malicious SVG disguised as a PDF, hosted on a professional area and filled with hidden redirects. By mid-September, it scaled right into a full spam wave with Microsoft-themed lures.

Let’s have a look at the way it labored, and the way analysts can collect the complete chain of intel in a protected sandbox setting.

Contained in the Current SVG Assault

Right here’s a sandbox session that exhibits the complete habits. Test the true case to look at the redirects and payload extraction stay:

View the sandbox session (SVG assault)

ANY.RUN’s sandbox session revealing malicious SVGs in phishing assault

Supply & disguise: The file arrives wanting like a PDF attachment however is an SVG (XML) file. As a result of SVG helps scripts, attackers embed lively content material as a substitute of static pixels.

Malicious SVG file despatched utilizing Sharesync

Uncover hidden threats, lower investigation time from hours to minutes, and keep forward of evolving assault strategies.Strive ANY.RUN now

Pretend immediate proven: Opening the file in a browser shows a “protected doc” message to social-engineer the consumer into clicking or ready.

Social engineering employed by attackers

Script execution (XOR decoder): The embedded JavaScript runs an XOR decode routine that reconstructs the true redirect code after which executes it (by way of eval). 

You’ll be able to see this straight in ANY.RUN’s static/HEX view: the decoder variables, the hex/escaped bytes (for instance ‘x65′,’x76’,…) and the reconstructed script are all uncovered within the session. That view lets analysts dump the decoded payload and assessment the precise instructions the SVG runs.

ANY.RUN’s static view exhibiting script execution

Layered redirects: The decoded code pushes the browser by means of a number of middleman domains, obfuscating the path. Examples noticed on this chain embrace:

loginmicrosft365[.]powerappsportals[.]com

loginmicr0sft0nlineofy[.]52632651246148569845521065[.]cc

Closing phishing web page: The consumer lands on a Microsoft-branded credential web page that even makes use of a Cloudflare Turnstile widget to look professional and bypass cursory checks. With ANY.RUN’s automated interactivity, these verifications are dealt with routinely, so analysts don’t waste time clicking by means of manually.

Cloudflare Turnstile widget utilized by attackers, uncovered inside ANY.RUN sandbox

Credential assortment & persistence: Entered credentials are captured and forwarded to attacker-controlled infrastructure constructed for scale (PhaaS-like), enabling mass harvesting.

Pretend Microsoft web page for credentials assortment

What the sandbox reveals: The interactive session exhibits each redirect and HTTP transaction, exposes the decoded JavaScript in HEX/Textual content, and captures runtime artifacts.

Exportable IOCs and stories will be straight built-in with SIEM, EDR, and threat-intel platforms, so analysts get the info contained in the instruments they already use, saving time and chopping further steps.

Properly-structured report generated by ANY.RUN sandbox

The Sandbox Benefit: Quick Detection of New Assaults

As you possibly can see, interactive sandboxes are particularly beneficial for recognizing new and evasive assaults. As a substitute of ready on static signatures or delayed alerts, they run the file in a stay setting and floor malicious behaviors in actual time.

With ANY.RUN, analysts can:

Get malicious verdicts in beneath 60 seconds: 88% of threats are detected this shortly.

Reveal the complete assault chain immediately: each redirect, script, and payload mapped out with out guesswork.

Speed up triage and response: groups report as much as 94% quicker triage and three× increased SOC efficiency.

Flip findings into motion: export IOCs and TTPs straight into SIEM, EDR, or TI platforms to replace detections and launch hunts instantly.

By reworking hours of handbook work into minutes of automated visibility, sandboxes give analysts the pace, readability, and context wanted to remain forward of recent assault strategies.

Request your 14-day trial and see how briskly you possibly can catch new assaults with ANY.RUN’s sandbox.

Cyber Security News Tags:Detect, Hidden, Payloads, Redirects

Post navigation

Previous Post: Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild
Next Post: Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

Related Posts

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
LangChainGo Vulnerability Let Attackers Access Sensitive Files Cyber Security News
Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News
Massive Cyber-Attack Attacking macOS Users via GitHub Pages to Deliver Stealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News