Trojans Embedded in .svg Files
色情网站通过在.svg文件中隐藏混淆的JavaScript代码进行攻击,利用JSFuck技术伪装代码。解码后会下载更多恶意脚本,最终触发Trojan.JS.Likejack病毒,自动点赞指定Facebook帖子。此攻击需用户已登录Facebook,并非新技术。 2025-8-15 11:7:51 Author: www.schneier.com(查看原文) 阅读量:14 收藏

Porn sites are hiding code in .svg files:

Unpacking the attack took work because much of the JavaScript in the .svg images was heavily obscured using a custom version of “JSFuck,” a technique that uses only a handful of character types to encode JavaScript into a camouflaged wall of text.

Once decoded, the script causes the browser to download a chain of additional obfuscated JavaScript. The final payload, a known malicious script called Trojan.JS.Likejack, induces the browser to like a specified Facebook post as long as a user has their account open.

“This Trojan, also written in Javascript, silently clicks a ‘Like’ button for a Facebook page without the user’s knowledge or consent, in this case the adult posts we found above,” Malwarebytes researcher Pieter Arntz wrote. “The user will have to be logged in on Facebook for this to work, but we know many people keep Facebook open for easy access.”

This isn’t a new trick. We’ve seen Trojaned .svg files before.

Tags: ,

Posted on August 15, 2025 at 7:07 AM0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.


文章来源: https://www.schneier.com/blog/archives/2025/08/trojans-embedded-in-svg-files.html
如有侵权请联系:admin#unsafe.sh