Beware SVG Smuggling: Stealthy Malware Hides in Images

Beware SVG Smuggling: Stealthy Malware Hides in Images
September 22, 2025 at 12:00 AM

Cybercriminals are turning harmless-looking SVG image files into self-contained malware delivery systems. A Latin American campaign, hitting Colombia hardest, uses urgent court-themed emails to trick recipients into opening oversized SVG attachments.

What happens next:

  • The SVG opens in the browser and renders a fake judicial portal with a staged workflow, progress bars, and verification steps.
  • It triggers the download of a password-protected ZIP; the password is conveniently shown on the page.
  • Running the included executable advances the compromise, using DLL sideloading to blend in and ultimately deploy AsyncRAT.

Why this tactic works:

  • The technique, known as SVG smuggling, was recently added to MITRE ATT&CK and is showing up in more attacks.
  • SVGs can embed scripts, links, and interactivity inside XML, helping lures slip past some defenses and removing the need for external command-and-control.
  • Each target receives a unique, bloated SVG (often over 10 MB) packed with randomized data to hinder detection. Artifacts suggest some files are AI-assisted, with boilerplate text, repetitive class names, and even invalid MD5s.

What AsyncRAT can do:

  • Keystroke logging, screenshot capture, camera and mic hijacking, and theft of browser-stored credentials.

Notable clues from this campaign:

  • One sample is detected by ESET as JS/TrojanDropper.Agent.PSJ (SHA1: 0AA1D24F40EEC02B26A12FBE2250CAB1C9F7B958).
  • Detection telemetry showed mid-week spikes throughout August, suggesting a systematic operation.

How to stay safe:

  • Treat unexpected SVG attachments as suspicious; real government agencies will not email you SVG files.
  • Be wary of urgent legal threats in email. Do not click links or open attachments you did not request.
  • Use strong, unique passwords and enable two-factor authentication.
  • Keep reputable security software active on all devices.

Source: WeLiveSecurity

Back…