Back to Hub

SVG Malware Evades Detection Through Image-Based Attacks

Imagen generada por IA para: Malware en SVG Evade Detección Mediante Ataques Basados en Imágenes

A new wave of cyberattacks is exploiting Scalable Vector Graphics (SVG) files to deliver malware while bypassing conventional security defenses. Security analysts have uncovered a campaign, designated GPUGate, that utilizes malicious SVG images distributed through compromised Google Ads and fake GitHub repository commits.

SVG files, commonly used for web graphics and logos, are XML-based vector images that can contain JavaScript code. This inherent capability allows threat actors to embed malicious scripts within seemingly innocent image files. When victims open these SVG files in their web browsers, the embedded JavaScript executes automatically, initiating the infection chain.

The GPUGate campaign specifically targets IT service providers and technology companies through carefully crafted phishing lures. Attackers create fraudulent job postings and software updates via Google Ads, redirecting targets to websites hosting the malicious SVG files. Additionally, the threat actors compromise legitimate GitHub accounts to push fake commits containing the weaponized images.

Technical analysis reveals that the SVG files employ obfuscation techniques to avoid detection. The malicious JavaScript is often encoded or hidden within the XML structure, making it difficult for traditional antivirus solutions to identify the threat. Once executed, the script downloads additional payloads from command-and-control servers, including information stealers and remote access trojans.

This attack methodology represents a significant evolution in file-based malware delivery. Unlike executable files that trigger immediate security alerts, SVG files are typically considered low-risk and often bypass content filters. The campaign's multi-vector approach combining search engine advertising, code repository exploitation, and file format abuse demonstrates sophisticated operational planning.

Security professionals recommend implementing content disarm and reconstruction (CDR) solutions for SVG files, along with enhanced web filtering and user education about the risks associated with opening image files from untrusted sources. Organizations should also monitor for unusual GitHub activity and implement additional verification for code commits.

The emergence of SVG-based malware delivery underscores the continuous cat-and-mouse game between cybercriminals and security providers. As organizations strengthen defenses against traditional attack vectors, threat actors increasingly turn to unconventional methods exploiting trusted file formats and distribution channels.

Original source: View Original Sources
NewsSearcher AI-powered news aggregation

Comentarios 0

¡Únete a la conversación!

Sé el primero en compartir tu opinión sobre este artículo.