Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize SVG Files and Office Documents to Target Windows Users

Hackers Weaponize SVG Files and Office Documents to Target Windows Users

Posted on December 20, 2025December 20, 2025 By CWS

Cybersecurity researchers have uncovered a complicated e-mail marketing campaign deploying a commodity loader to distribute Distant Entry Trojans and data stealers.

The operation primarily targets manufacturing and authorities organizations throughout Italy, Finland, and Saudi Arabia, utilizing extremely evasive methods.

An infection chain

Multi-Vector Assault Technique

The marketing campaign employs a number of an infection strategies to compromise Home windows techniques. Risk actors are distributing weaponized Microsoft Workplace paperwork that exploit CVE-2017-11882, a vital reminiscence corruption vulnerability within the Equation Editor part.

Moreover, attackers leverage malicious SVG information and ZIP archives containing LNK shortcuts, all converging on a unified commodity loader infrastructure.

E mail with attachment

The assaults start with focused phishing emails masquerading as respectable Buy Order communications from enterprise companions.

These misleading messages comprise RAR archives hiding first-stage JavaScript payloads designed to bypass preliminary safety screening.

The malware operates by way of a complicated four-stage execution pipeline engineered to evade detection.

The preliminary JavaScript file incorporates closely obfuscated code that dynamically reconstructs malicious strings utilizing break up and be part of operations. Upon execution, it creates a hidden PowerShell course of utilizing Home windows Administration Instrumentation objects.

Courses current in Clear Job Scheduler (left) appended malicious content material (proper)

The second stage retrieves a malicious PNG picture from respectable internet hosting providers similar to Archive.org.

This picture incorporates steganographically embedded base64-encoded .NET assemblies hidden on the finish of the file. The PowerShell script extracts this payload utilizing a daily expression. It masses it instantly into reminiscence with out writing to disk.

Within the third stage, attackers weaponize the respectable open-source TaskScheduler library from GitHub.

By appending malicious features to the supply code and recompiling it, they create a trojanized meeting that retains an genuine look whereas embedding malicious capabilities.

The ultimate stage employs course of injection methods, making a suspended RegAsm.exe course of and injecting the decoded payload into its reminiscence house.

This course of hollowing permits malware to masquerade as respectable Home windows utilities whereas executing malicious code.

Payload Supply and Capabilities

The marketing campaign delivers numerous information-stealing instruments and RATs, together with PureLog Stealer, Katz Stealer, DC Rat, Async Rat, and Remcos.

The PureLog Stealer payload is decrypted utilizing Triple DES encryption in CBC mode earlier than being invoked to exfiltrate delicate knowledge, together with browser credentials, cryptocurrency pockets data, and complete system particulars.

Injecting payload into RegAsm.exe

Researchers at Cyble Analysis and Intelligence Labs (CRIL) recognized a novel Consumer Account Management (UAC) bypass approach through which malware screens system process-creation occasions and opportunistically triggers UAC prompts throughout respectable launches, tricking customers into granting elevated privileges.

Cross-campaign evaluation reveals standardized methodology throughout a number of risk actors, suggesting the loader operates as a shared supply framework.

Analysis from Seqrite, Nextron Techniques, and Zscaler documented similar class naming conventions and execution patterns throughout numerous malware households, confirming the widespread availability of this infrastructure.

Organizations ought to implement enhanced e-mail filtering, disable legacy Workplace equation editor elements, scrutinize picture attachments, and monitor for suspicious PowerShell exercise to mitigate these subtle threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Documents, Files, Hackers, Office, SVG, Target, Users, Weaponize, Windows

Post navigation

Previous Post: Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
Next Post: CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware

Related Posts

DragonForce Ransomware Threatens Global Business Security DragonForce Ransomware Threatens Global Business Security Cyber Security News
Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence Cyber Security News
New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK Cyber Security News
Critical Security Update Addresses Veeam RCE Vulnerabilities Critical Security Update Addresses Veeam RCE Vulnerabilities Cyber Security News
Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Cyber Security News
PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark