Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Posted on July 15, 2025July 15, 2025 By CWS

Ontinue warns of a newly noticed phishing marketing campaign leveraging Scalable Vector Graphics (SVG) information in redirect assaults that evade conventional detection.

Whereas thought of innocent picture codecs, SVG information can comprise embedded scripts, and menace actors have been abusing this to inject obfuscated JavaScript code resulting in browser redirects at runtime.

The malicious code is hidden inside a CDATA part of the SVG file and depends on a static XOR key to decrypt a payload at runtime. The decrypted code reconstructs a redirect command and builds a vacation spot URL that additionally incorporates monitoring performance.

“JavaScript execution is achieved with out requiring file drops or macros, and evasion is additional enhanced by distributing the payload through spoofed emails that will move fundamental anti-spam filters,” Ontinue says.

The malicious SVG information are delivered through phishing emails that use domains with weak or misconfigured DKIM, DMARC, and SPF information, permitting the attackers to impersonate the sender. In some instances, the attackers have used domains like these of respectable entities.

The messages sometimes have landed in inboxes missing DKIM information and DMARC insurance policies. The noticed emails are minimalistic, with solely a number of strains within the physique, instructing the sufferer to preview the picture within the browser. The SVG file is both delivered as an attachment or hosted externally, and a hyperlink to it’s included within the message.

As a part of the marketing campaign, the attackers used domains with a randomized or subdomain-based construction, to hinder static-filtering detection. The domains have low or unknown status and look like rotated repeatedly.

The assaults primarily focused B2B service suppliers, comparable to monetary and worker companies corporations, utilities, and software-as-a-service suppliers, which deal with priceless company knowledge repeatedly.Commercial. Scroll to proceed studying.

The usage of SVG smuggling in these focused phishing campaigns permits attackers to evade conventional behavioral or signature-based detection, because the embedded script logic triggers the redirection straight within the browser, with out person interplay or exterior downloads.

“This marketing campaign stands out for its use of browser-native redirection with out requiring person interplay or exterior downloads. It bridges the hole between conventional phishing and full malware supply, making it stealthy and efficient,” Ontinue notes.

In response to Sectigo senior fellow Jason Soroko, to mitigate these assaults, defenders have to deal with content material the identical means they deal with code. 

“Deal with each inbound SVG as a possible executable. Strip or block script tags. Implement strict DMARC alignment and auto purge questionable mail. Instrument telemetry to catch browser pivots triggered by window location adjustments that originate from picture previews. Layered controls, like Protected Hyperlinks content material disarmament, and lookalike area monitoring, will disrupt the straightforward path attackers now depend on,” Soroko stated.

Associated: Google Gemini Tricked Into Displaying Phishing Message Hidden in E-mail

Associated: 13 Romanians Arrested for Phishing the UK’s Tax Service

Associated: Microsoft 365 Direct Ship Abused for Phishing

Associated: SMTP Smuggling Permits Spoofed Emails to Bypass Authentication Protocols

Security Week News Tags:Actors, BrowserNative, Redirection, Smuggling, SVG, Threat

Post navigation

Previous Post: GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality
Next Post: Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack

Related Posts

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
Canada Gives Hikvision the Boot on National Security Grounds Security Week News
Chrome Update Patches Fifth Zero-Day of 2025 Security Week News
Critical Wing FTP Server Vulnerability Exploited Security Week News
Russian APT Exploiting Mail Servers Against Government, Defense Organizations Security Week News
Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
  • IoT Security Firm Exein Raises $81 Million 
  • Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
  • Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim
  • Chrome Update Patches Fifth Zero-Day of 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
  • IoT Security Firm Exein Raises $81 Million 
  • Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
  • Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim
  • Chrome Update Patches Fifth Zero-Day of 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News