What you see will not be at all times what you get as cybercriminals more and more weaponize SVG recordsdata as supply vectors for stealthy malware
22 Sep 2025
•
,
4 min. learn

A latest malware marketing campaign making the rounds in Latin America gives a stark instance of how cybercriminals are evolving and finetuning their playbooks.
However first, right here’s what’s not so new: The assaults depend on social engineering, with victims receiving emails which can be dressed as much as look as if they arrive from trusted establishments. The messages have an aura of urgency, warning their recipients about lawsuits or serving them court docket summons. This, after all, is a tried-and-tested tactic that goals to scare recipients into clicking on hyperlinks or opening attachments with out considering twice.
The tip objective of the multi-stage marketing campaign is to put in AsyncRAT, a distant entry trojan (RAT) that, as additionally described by ESET researchers, lets attackers remotely monitor and management compromised gadgets. First noticed in 2019 and out there in a number of variants, this RAT can log keystrokes, seize screenshots, hijack cameras and microphones, and steal login credentials saved in internet browsers.
To date, so acquainted. Nonetheless, one factor that units this marketing campaign other than most related campaigns is using outsized SVG (Scalable Vector Graphics) recordsdata that comprise “the complete bundle”. This obviates the necessity for exterior connections to a distant C&C server as a manner of sending instructions to compromised gadgets or downloading extra malicious payloads. Attackers additionally seem to rely at the very least partly on synthetic intelligence (AI) instruments to assist them generate personalized recordsdata for each goal.
SVGs because the supply vector
Assaults involving booby-trapped photographs generally, akin to JPG or PNG recordsdata, are nothing new, neither is this the primary time SVG recordsdata particularly have been weaponized to ship RATs and different malware. The approach, which known as “SVG smuggling”, was just lately added to the MITRE ATT&CK database after being noticed in an growing variety of assaults.
However what makes SVG so interesting to attackers? SVGs are versatile, light-weight vector picture recordsdata which can be written in eXtensible Markup Language (XML) and are useful for storing textual content, shapes, and scalable graphics, therefore their use in internet and graphic design. The power of SVG lures to hold scripts, embedded hyperlinks and interactive components makes them ripe for abuse, all whereas growing the chances of evading detection by some conventional safety instruments.
This explicit marketing campaign, which primarily focused Colombia, begins with a seemingly legit e-mail message that features an SVG attachment. Clicking on the file, which is usually greater than 10 MB in dimension, doesn’t open a easy graphic, chart or illustration – as an alternative, your internet browser (the place SVG recordsdata load by default) renders a portal impersonating Colombia’s judicial system. You even go on to witness a “workflow”, full with faux verification pages and a progress bar.

One such SVG file (SHA1: 0AA1D24F40EEC02B26A12FBE2250CAB1C9F7B958) is detected by ESET merchandise as JS/TrojanDropper.Agent.PSJ. Upon clicking, it performs out a course of, and moments later, your internet browser downloads a password-protected ZIP archive (Determine 2)..

The password to open the ZIP archive is conveniently displayed proper under the “Obtain accomplished” message (Determine 3), maybe to strengthen the phantasm of authenticity. It incorporates an executable that, as soon as run, strikes the assault a step additional so as to finally compromise the gadget with AsyncRAT.

The marketing campaign leverages a way generally known as DLL sideloading, the place a legit utility is instructed to load a malicious payload, thus permitting the latter to mix in with regular system habits, all within the hopes of evading detection.
Our detection telemetry (Determine 4) exhibits that these campaigns spiked mid-week all through August, with Colombia hit the toughest. This sample means that attackers are operating this operation in a scientific method.

Behind the dropper
Typical phishing and malware campaigns blast out the identical attachment to numerous inboxes. Right here, every sufferer receives a distinct file. Whereas all of them borrow from the identical playbook, each file is full of randomized information, making each pattern distinctive. This randomness, which in all probability includes utilizing a equipment that generates the recordsdata on demand, can also be designed to complicate issues for safety merchandise and defenders.

As talked about, the payload isn’t fetched from exterior – as an alternative, it’s embedded contained in the XML itself and assembled “on the fly”. A take a look at the XML additionally reveals oddities, akin to boilerplate textual content, clean fields, repetitive class names, and even some “verification hashes” that develop into invalid MD5 strings, suggesting that these may very well be LLM-generated outputs.


Classes discovered
By packing all of it into self-contained, innocuously-looking SVG recordsdata and probably leveraging AI-generated templates, attackers search to scale up their operations and lift the bar for deception.
The lesson right here is simple: vigilance is vital. Keep away from clicking on unsolicited hyperlinks and attachments, particularly when the messages use pressing language. Additionally, deal with SVG recordsdata with utmost suspicion; certainly, no precise authorities company will ship you an SVG file as an e-mail attachment. Recognizing these fundamental warning indicators may imply the distinction between sidestepping the lure and handing attackers the keys to your gadget.
After all, mix this vigilance with fundamental cybersecurity practices, akin to utilizing robust and distinctive passwords together with two-factor authentication (2FA) wherever out there. Safety software program on all of your gadgets can also be a non-negotiable line of protection in opposition to all method of cyberthreats.