๐จ ๐ฆ๐ฉ๐ ๐ฆ๐บ๐๐ด๐ด๐น๐ถ๐ป๐ด ๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐๐ถ๐๐ ๐๐ผ๐น๐ผ๐บ๐ฏ๐ถ๐ฎ๐ป ๐ข๐ฟ๐ด๐ฎ๐ป๐ถ๐๐ฎ๐๐ถ๐ผ๐ป๐
Weโre seeing a surge in a #phishing campaign targeting government, finance, oil and gas, and healthcare sectors in Colombia โ ๏ธ
Attackers distribute Spanish-language emails with an attached SVG file. The file is not a static image but an active SVG containing embedded JavaScript that uses SVG smuggling to reconstruct the next stage locally via a blob URL, without fetching a payload from external resources.
The browser then generates an intermediate HTML lure that mimics document preparation, and from embedded data creates a password-protected ZIP archive for the user to open.
โ๏ธ This kind of attack can blur early-stage visibility for SOC teams. SVG smuggling, blob objects, and legitimate Windows components break the compromise into weak signals, making detection and investigation harder in the early stages.
โก #ANYRUN Sandbox allows analysts to quickly reconstruct ๐๐ต๐ฒ ๐ณ๐๐น๐น ๐ฒ๐
๐ฒ๐ฐ๐๐๐ถ๐ผ๐ป ๐ฐ๐ต๐ฎ๐ถ๐ป:
SVG smuggling โก๏ธ Blob-based HTML lure โก๏ธ Password-protected ZIP โก๏ธ Notificacion Fiscal.js (launcher / execution handoff) โก๏ธ radicado.hta (dropper) โก๏ธ J0Ogv7Hf.ps1 (script-based RAT / Vjw0rm-like implant) โก๏ธ C2 communication
โ
This helps security teams connect scattered artifacts faster, expose hidden delivery stages, and confirm malicious activity before the attack moves further.
๐จโ๐ป Learn how #ANYRUN helps detect complex threats faster: https://any.run/features/?utm_source=mastodon&utm_medium=post&utm_campaign=svg_smuggling_campaign&utm_term=230326&utm_content=linktosandboxlanding
#cybersecurity #infosec