Cyber Security News

Hackers Weaponizing SVG Files to Stealthily Deliver Malicious Payloads

Cybercriminals have embraced a new deceptive technique that transforms seemingly harmless vector graphics into dangerous malware delivery systems.

A recent campaign targeting Latin America demonstrates how attackers are exploiting oversized SVG files containing embedded malicious payloads to distribute AsyncRAT, a potent remote access trojan capable of comprehensive system compromise.

The campaign begins with carefully crafted phishing emails impersonating legitimate institutions, particularly judicial systems, to create urgency around fictitious legal proceedings or court summons.

Victims receive messages claiming lawsuits or official documents require immediate attention, compelling recipients to open attached SVG files without proper scrutiny.

Unlike traditional malware campaigns that require external command-and-control infrastructure, these weaponized SVG files contain complete malicious packages within themselves.

The technique, known as SVG smuggling, leverages the XML-based nature of Scalable Vector Graphics to embed scripts, interactive elements, and encoded payloads directly into what appears to be an innocent image file.

XML file used in the campaign (Source – Welivesecurity)

Welivesecurity analysts noted that these files often exceed 10 MB in size, far larger than typical graphics, and immediately render fake government portals when opened in web browsers.

The attackers appear to utilize artificial intelligence tools to generate customized files for individual targets, with each victim receiving uniquely crafted SVG files stuffed with randomized data to evade signature-based detection systems.

Infection Mechanism and Payload Deployment

The infection process unfolds through a sophisticated multi-stage workflow designed to maintain victim engagement while downloading malicious components.

When users click the SVG attachment, their default web browser renders an elaborate fake portal mimicking Colombia’s judicial system, complete with official logos, government styling, and dynamic progress indicators.

The malicious SVG file contains embedded JavaScript that simulates document verification processes, displaying realistic progress bars and status messages like “Verificando documentos oficiales” and “30% completado” to create authenticity.

During this theatrical display, the script quietly assembles and deploys a password-protected ZIP archive containing the final AsyncRAT payload.

The embedded code includes base64-encoded binary data that gets decoded and assembled on-the-fly:-

const payloadData = "UESDBBQACQgIAGxD+VpRqIWSufYYACn8GAAxAAAAMDFfREVNQU5EQSBQRU5BTCBQT1IgRUwgSlVaR0FETyAwMS...";
const binaryString = atob(payloadData);
const bytes = new Uint8Array(binaryString.length);

The campaign employs DLL sideloading techniques where legitimate applications load malicious libraries, allowing the final AsyncRAT payload to blend with normal system processes and evade detection.

Detection telemetry reveals systematic deployment patterns, with attack spikes occurring mid-week throughout August 2025, primarily targeting Colombian users.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability

CISA has released a comprehensive cybersecurity advisory detailing how threat actors successfully compromised a U.S.…

10 minutes ago

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

4 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

6 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

6 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

7 hours ago

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy…

11 hours ago