利用SVG格式进行恶意HTML内容传递的新式网络钓鱼技术
网络专家发现一种新型钓鱼技术,利用SVG文件格式嵌入恶意HTML代码。攻击者将SVG文件伪装成普通图片附件发送给受害者。当受害者打开文件时,会显示钓鱼页面或重定向至恶意网站。这种攻击手段因SVG文件的特性而具有高度隐蔽性。 2025-4-21 15:44:23 Author: cybersecuritynews.com(查看原文) 阅读量:10 收藏

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver malicious HTML content to unsuspecting victims.

This emerging threat, first observed at the beginning of 2025, represents a notable evolution in phishing tactics as attackers leverage the dual nature of SVG files to bypass security measures and trick users into revealing sensitive information.

SVG image (Source – Securelist)

Unlike conventional image formats such as JPEG or PNG, SVG files utilize XML markup that supports the embedding of JavaScript and HTML code.

Google News

Sample SVG file with embedded HTML code (Source – Securelist)

This legitimate feature, normally intended to enable interactive graphical elements, has become a vulnerability exploited by malicious actors who embed phishing pages or redirection scripts directly within what appears to be a harmless image attachment.

Phishing page mimicking Google Voice (Source – Securelist)

The attack vector typically begins with an email containing an SVG attachment disguised as something innocuous—often an audio recording or document requiring signature.

When opened, these files execute their embedded code, either displaying an HTML page with deceptive content or using JavaScript to redirect victims to sophisticated phishing sites that mimic legitimate services like Google Voice or Microsoft login portals.

Securelist researchers identified a significant uptick in this attack methodology during March 2025, documenting 2,825 malicious emails utilizing SVG attachments in the first quarter alone.

The upward trend has continued through April, with 1,324 incidents recorded in just the first half of the month—suggesting attackers are finding this technique increasingly effective against existing security measures.

Infection Mechanism Analysis

The technical execution of these attacks showcases a deceptive simplicity. When examining a malicious SVG file in a text editor, security researchers discovered that many contain minimal vector graphics code, instead housing complete HTML documents or JavaScript redirection functions.

One captured sample demonstrates how attackers embed executable code within the standard SVG structure:-

  String.fromCharCode(HicRzF.charCodeAt(0) + (HiCRzF...
]]>

This script-laden SVG, when opened in a web browser, executes immediately and either renders a convincing phishing page contained entirely within the file or launches a connection to an external malicious domain where credentials are harvested.

The technique is particularly effective because the file maintains its “.svg” extension and is flagged as an image/svg+xml content type in email headers, allowing it to evade many attachment filtering systems that primarily block executable formats and traditional HTML attachments.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy


文章来源: https://cybersecuritynews.com/new-phishing-attack-appending-weaponized-html-files/
如有侵权请联系:admin#unsafe.sh