Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Posted on July 15, 2025July 15, 2025 By CWS

Ontinue warns of a newly noticed phishing marketing campaign leveraging Scalable Vector Graphics (SVG) information in redirect assaults that evade conventional detection.

Whereas thought of innocent picture codecs, SVG information can comprise embedded scripts, and menace actors have been abusing this to inject obfuscated JavaScript code resulting in browser redirects at runtime.

The malicious code is hidden inside a CDATA part of the SVG file and depends on a static XOR key to decrypt a payload at runtime. The decrypted code reconstructs a redirect command and builds a vacation spot URL that additionally incorporates monitoring performance.

“JavaScript execution is achieved with out requiring file drops or macros, and evasion is additional enhanced by distributing the payload through spoofed emails that will move fundamental anti-spam filters,” Ontinue says.

The malicious SVG information are delivered through phishing emails that use domains with weak or misconfigured DKIM, DMARC, and SPF information, permitting the attackers to impersonate the sender. In some instances, the attackers have used domains like these of respectable entities.

The messages sometimes have landed in inboxes missing DKIM information and DMARC insurance policies. The noticed emails are minimalistic, with solely a number of strains within the physique, instructing the sufferer to preview the picture within the browser. The SVG file is both delivered as an attachment or hosted externally, and a hyperlink to it’s included within the message.

As a part of the marketing campaign, the attackers used domains with a randomized or subdomain-based construction, to hinder static-filtering detection. The domains have low or unknown status and look like rotated repeatedly.

The assaults primarily focused B2B service suppliers, comparable to monetary and worker companies corporations, utilities, and software-as-a-service suppliers, which deal with priceless company knowledge repeatedly.Commercial. Scroll to proceed studying.

The usage of SVG smuggling in these focused phishing campaigns permits attackers to evade conventional behavioral or signature-based detection, because the embedded script logic triggers the redirection straight within the browser, with out person interplay or exterior downloads.

“This marketing campaign stands out for its use of browser-native redirection with out requiring person interplay or exterior downloads. It bridges the hole between conventional phishing and full malware supply, making it stealthy and efficient,” Ontinue notes.

In response to Sectigo senior fellow Jason Soroko, to mitigate these assaults, defenders have to deal with content material the identical means they deal with code. 

“Deal with each inbound SVG as a possible executable. Strip or block script tags. Implement strict DMARC alignment and auto purge questionable mail. Instrument telemetry to catch browser pivots triggered by window location adjustments that originate from picture previews. Layered controls, like Protected Hyperlinks content material disarmament, and lookalike area monitoring, will disrupt the straightforward path attackers now depend on,” Soroko stated.

Associated: Google Gemini Tricked Into Displaying Phishing Message Hidden in E-mail

Associated: 13 Romanians Arrested for Phishing the UK’s Tax Service

Associated: Microsoft 365 Direct Ship Abused for Phishing

Associated: SMTP Smuggling Permits Spoofed Emails to Bypass Authentication Protocols

Security Week News Tags:Actors, BrowserNative, Redirection, Smuggling, SVG, Threat

Post navigation

Previous Post: GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality
Next Post: Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack

Related Posts

Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers Security Week News
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News
Orange Belgium Data Breach Impacts 850,000 Customers Security Week News
Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty Security Week News
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News