Description

Attackers are increasingly using Scalable Vector Graphics (SVG) attachments as a means to circumvent detection in phishing and malware attacks. In contrast to traditional image formats such as JPG and PNG, SVG consists of shapes, lines, and text, rather than pixels. Since SVG files are vector-based, they can be resized without losing quality, making them ideal for web applications. Malicious use of SVG files isn't new; past campaigns, such as Qbot malware, have used them to conceal harmful scripts. However, recent research indicates a rise in the use of SVGs to deliver phishing forms or malware. The versatile element in SVG files allows attackers to embed HTML and JavaScript, enabling the creation of fake forms or automatic redirects to phishing sites when the SVG file is opened. In one example, a malicious SVG attachment mimics a spreadsheet with a fake login form that captures submitted credentials. Other attacks use SVG files to impersonate official documents or prompts, encouraging users to click and unknowingly download malware. The major concern is that SVG files are often not flagged by security software due to their text-based nature. Many samples uploaded to VirusTotal show minimal detection rates, making them effective tools for evading traditional security measures. Given the rarity of legitimate emails containing SVG attachments, users should exercise caution. Unless you are a developer or have a specific expectation to receive SVG files, any email with an SVG attachment should be treated as suspicious and deleted immediately.