Criminals who conduct phishing assaults over electronic mail have ramped up their abuse of a brand new menace vector designed to bypass present anti-spam and anti-phishing safety: Using a graphics file format known as SVG.
The assaults, which start with electronic mail messages which have .svg file attachments, started to spread late last year, and have ramped up considerably since mid-January.
The file format is designed as a technique to attract resizable, vector-based pictures on a pc. By default, SVG information open within the default browser on Home windows computer systems. However SVG information usually are not simply composed of binary information, just like the extra acquainted JPEG, PNG, or BMP file codecs. SVG information include textual content directions in an XML format for drawing their photos in a browser window.

However as a result of SVG pictures can load and render natively inside a browser, they will additionally include anchor tags, scripting, and other forms of energetic net content material. On this means, menace actors have been abusing the file format. The SVG information used within the assaults embody some directions to attract quite simple shapes, reminiscent of rectangles, but in addition include an anchor tag that hyperlinks to an online web page hosted elsewhere.

When an individual unfamiliar with the format double-clicks the attachment of their electronic mail, their pc opens the SVG file of their browser. The browser renders each the vector graphics and the anchor tags in a brand new tab.

If the goal clicks the hyperlink embedded within the SVG file, the browser will then open the hyperlink, which invariably results in a social engineering trick designed to lure the goal right into a scenario the place they should log in to an account.
Social engineering methods utilized in SVG phishing assaults
The topic strains and messages we’ve seen use many tropes frequent to generic phishing assaults.
One of many patterns getting used asserts that the attachment is a authorized doc that requires a signature. The message topic might use one of many following strains, or one thing comparable:
- Accomplished: [random characters]_Contract_and_Agreement_[numbers] REF ID [numbers]
- Time to Signal: 2025 SuperAnnuation Enrollment Settlement (January 2025).
- New Voicemail [recipient’s email username]
- You’ve gotten a brand new voicemail
- New Voicemail from [email username]
- New Vendor PO#[numbers] (Submission Ref: [random characters], Dated: [date]/Jan/2025)
- TT-[numbers] Permitted
- XeroxVersaLink_[random characters]-2025-01-[date]_Contract_[random characters].pdf
- Well being and Bonus Advantages Enrollment -Ref:-br#[numbers], Dated : [date]/Jan/2025
- Fee Recommendation – Ref: / RFQ Precedence Fee / Buyer Ref:
- KPI Evaluate and Fee Launch for [email username] (Ref: [numbers], Dated [day of week], [date]).
- Essential: Save or print your finalized doc Evaluate Doc completion—kindly affirm or ammend #BookingRef-[random characters]
- Fee Affirmation – SWIFT [random characters].pdf
- Your RemittanceReciept Fax-[date]/2025 [time] Contact – [email address]
- eSignature Required: Capital Funding Docs Through e-Docs Ref-[random characters]
- Motion: Scan Information: Distribution Settlement on your evaluate and signature. Message ID: #[random characters]
- Attn: Audio Recording REC#[numbers].wav Transcript [date] January 2025 $[random characters]
Many well-known manufacturers and on-line companies are being abused by these assaults, together with:
- DocuSign
- Microsoft SharePoint
- Dropbox
- Google Voice
- RingCentral
The physique content material of those messages is equally rudimentary, although it might include the e-mail username (the a part of the tackle that seems earlier than the @ signal) of the recipient/goal within the physique of the message.

How the assault works
When the goal receives an electronic mail with an SVG attachment and opens it, until they’ve one other program they already use to work with SVG information, the file opens within the default browser.
The best of those malicious SVG information include one or just a few strains of hyperlinked textual content that prepend the e-mail username to the phrase “Click on To Open” or “Click on the hyperlink under to hearken to the voicemail.”
The hyperlink results in a phishing web page behind a CloudFlare captcha gate. Test the field to show you’re a human, and also you’re redirected to a web page operated by the phishing gang that frames an actual Office365 login dialog inside itself, so it could actually validate the e-mail and password similtaneously stealing it.


Nonetheless, we’ve discovered extra elaborately constructed information as nicely. One model embeds a hyperlink to a distant picture within the “svg.” The photographs are hosted on a distinct, attacker-controlled area.

There are a number of completely different variations of the embedded picture which might be designed to appear to be DocuSign or SharePoint pages. Clicking wherever on the picture hundreds the CAPTCHA-gated phishing web page. One other model hundreds the picture from a Google Doc.

Probably the most convoluted of those malicious SVGs contained entire blocks of textual content that had been lifted, seemingly at random, from Wikipedia articles. The textual content was embedded within the supply of the SVG however commented out, so it doesn’t seem on display.

Additionally current inside one other SVG was an elaborate JavaScript that mechanically hundreds the phishing web page after a brief delay, even when the consumer doesn’t click on any of the hotlinked content material.

The phishing pages have been all hosted on attacker-controlled domains. As beforehand talked about, almost all of them have been gated with a CloudFlare CAPTCHA to forestall automated visits. The websites prefetch the content material of the Office365 login dialog from login.dwell.com and current the goal with all of the anticipated animations acquainted to an O365 consumer.

In some instances, the script pre-populated the login dialog with the goal’s electronic mail tackle, which had been handed within the question string from the hyperlink embedded within the SVG file. An “EventListener” JavaScript within the iFrame captures all typed enter because the consumer enters it into the shape.
In checks we ran in opposition to dwell websites, a lot of the websites instantly captured the textual content enter and exfiltrated it on to the area internet hosting the iFrame the login dialog seems in. In just a few instances, we found that the credentials have been transmitted to a number of websites concurrently.

One session even handed the credentials to a Telegram bot utilizing the messaging service’s API.

Over the course of every week, we have been in a position to observe the phishing pages rising extra subtle. Very sparsely designed pages started to get cleaner, reminiscent of this “voicemail” web page.

We additionally noticed manufacturers like Google Voice rigorously mimicked in some phishing pages.

We finally discovered variations that focused completely different languages, based mostly on the top-level area of the recipient. For instance, each the e-mail addressed to a goal at a Japanese tutorial establishment, and its embedded SVG, was crafted in Japanese. This led to a really sensible trying simulacrum of a Dropbox login display, additionally localized to Japanese.

One of many SVG information appeared to attempt to leverage a networked drive on the goal’s personal community. It contained a Microsoft community path as an alternative of a URL.
The “Shared File” hyperlink triggered a obtain of an HTML file, which when opened produced a web page that appears prefer it has a blurred PDF doc within the background.

However when examined, the browser threw an error message that indicated the positioning was attempting to open an area community path in Home windows Explorer.

The web page supply appears to wish to open a community path underneath “trycloudflare.com” that passes an embedded, hardcoded username and password unsuccessfully.

Lastly, one other of the SVG information we found appeared to include a considerable amount of information encoded as base64. After we decoded the information, we discovered that it was a Zip archive, containing two information.

Of the 2 information compressed into the Zip file, one was password-protected, the opposite was not. The password-protected file is a Home windows malware executable. The unprotected file was a plaintext doc that, oddly, contained the password for the opposite file within the archive.

It’s the primary time I’d seen a password for a password-protected Zip embedded into the Zip itself. Nevertheless it did, the truth is, work.

The file, uncompressed, is a malware that we currently detect as Troj/AutoIt-DHB. It’s an AutoIt script that units up and installs a keystroke logger known as Nymeria, all by the goal double-clicking what’s ostensibly a picture file.
Critical sufferer grief
Malicious SVG information seem designed to evade detection by typical endpoint or mail safety instruments. Nonetheless, work by analysts because of this analysis led to the event of a detection signature for the assorted sorts of weaponized information we’ve noticed. That detection, Cxmail/EmSVG-C, is now dwell in Sophos Central Electronic mail.
For normal of us, there are a few issues that may be completed to inoculate your pc in opposition to this menace. First, yow will discover an actual SVG graphic file, obtain it, after which instruct Home windows to all the time open it in Notepad (or another non-browser program) as an alternative of the default browser.
To do that, you simply obtain a real SVG graphic, like this one to your desktop. Proper-click the file, and select “Open with -> Select one other app” – choose one thing that isn’t a browser (like Notepad) and fill within the checkbox that reads “At all times use this app to open .svg information.”


Even in case you by accident click on a malicious SVG sooner or later, it’ll solely open in Notepad, throwing one other roadblock in entrance of (doubtlessly) being phished. (If, in some unspecified time in the future, you discover you must work with actual SVG information, observe the identical steps once more, and select the graphics software you intend to make use of.)
The phishing pages that loaded on this assault have been additionally fairly clearly not hosted on Microsoft’s regular web sites. Merely trying on the URL within the browser tackle bar needs to be sufficient to disclose you’re not visiting SharePoint or DocuSign, if you’re loading a web page with an .ru top-level area.

There have been different clues as nicely, reminiscent of the truth that the invoices or different messages appeared to return from electronic mail accounts that had by no means emailed the targets earlier than, and have been mild on particulars like contact data (and even any message in any respect within the physique, in some instances).

So retaining a pointy, important eye on messages that appear fishy is perhaps the perfect phishing prevention
Indicators of compromise
Indicators of compromise for this menace have been posted to our Github repository. Detections have been added for the spam attachment subtype (CXmail/EmSVG-C) in Central Electronic mail, SFOS, and a few endpoint merchandise, in addition to signature-based detection for the malicious SVG attachments (Troj/XMLPh-A, Troj/XMLPh-E, Troj/XMLPh-F, Troj/XMLDrp-AJ, Troj/XML-AV, and Troj/XMLDl-Okay).
Acknowledgments
Sophos X-Ops thanks Brett Cove and Fan Ho of the mail safety staff, and Krupa Gajjar, Rutvik Panchal, Khushi Punia, Gyan Ranjan, Purva Shah, Kafil Ahmed Shaikh, Devang Sharma, Simran Sharma, Aaditya Trivedi, and Amey Vijaywargiya of SophosLabs.