LevelBlue's SpiderLabs uncovers how attackers abuse Blob URLs in HTML smuggling to deliver sneaky phishing pages—like fake AmEx sites—bypassing email scanners and security tools. JavaScript decodes Base64-hidden HTML client-side for stealthy attacks. Stay vigilant! 🔒🕵️ #Cybersecurity #Phishing #HTMLSmuggling https://levelblue.com/blogs/spiderlabs-blog/html-smuggling-how-blob-urls-are-abused-to-deliver-phishing-content

https://mas.to/@nemo/115724156463085920

📄 Fake DocuSign sites hosted on GitCode are spreading malware via HTML smuggling. It’s a clever twist on a classic phish—don’t trust every “signature request.” 🧪📬
#PhishingAlert #HTMLSmuggling

https://thehackernews.com/2025/06/fake-docusign-gitcode-sites-spread.html

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Fake Gitcode and DocuSign sites are tricking users into running PowerShell scripts that install NetSupport RAT.

The Hacker News

Netskope reports on an Azorult infostealer campaign in the wild that delivers its initial payload through HTML smuggling. It uses reflective code loading (T1620) to execute the fileless Azorult malware, and an Anti Malware Scan Interface (AMSI) bypass technique (T1562.001) to avoid detection. Netskope provides the infection chain, infostealer features and IOC. 🔗 https://www.netskope.com/blog/from-delivery-to-execution-an-evasive-azorult-campaign-smuggled-through-google-sites

#Azorult #threatintel #HTMLsmuggling #IOC #infostealer

From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites

Summary Netskope Threat Labs has observed an evasive Azorult campaign in the wild that employs multiple defense evasion techniques from delivery through

Netskope
GitHub - eddiechu/File-Smuggling: HTML smuggling is not an evil, it can be useful

HTML smuggling is not an evil, it can be useful. Contribute to eddiechu/File-Smuggling development by creating an account on GitHub.

GitHub

Catch up on last week's infosec news with our latest newsletter: https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-538

#RaspberryRobin continues to improve its evasion mechanisms, extracting more data from victims in the Financial sector.

#Dridex developers look to be dabbling in creating a Mac variant - but aren't quite there yet.

#HTMLSmuggling is being used increasingly over the past few months by heavy-hitting first stage malware such as Qakbot, IcedID and BumbleBee - make sure you understand how it works and how to spot it.

#infosec #CyberAttack #Hacked #cyber #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities

SOC Goulash: Weekend Wrap-Up

02/01/2023 - 08/01/2023

Opalsec
HTML smugglers turn to SVG images - HTML smuggling is a technique attackers use to hide an encoded malicious script within an... https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/ #htmlsmuggling #qakbot
HTML smugglers turn to SVG images

* HTML smuggling is a technique attackers use to hide an encoded malicious script within an HTML email attachment or webpage. * Once a victim receives the email and opens the attachment, their browser decodes and runs the script, which then assembles a malicious payload directly on the victim’s device. * Talos

Cisco Talos Blog
Researchers Warn of Active Malware Campaign Using HTML Smuggling - A recently uncovered, active campaign called "Duri" makes use of HTML smuggling to deliver malware... https://threatpost.com/active-malware-campaign-html-smuggling/158439/ #krishnansubramanian #javascriptblobs #malwarecampaign #cloudservices #htmlsmuggling #menlosecurity #websecurity #coronavirus #podcasts #pandemic #malware #covid #duri
Researchers Warn of Active Malware Campaign Using HTML Smuggling

A recently uncovered, active campaign called "Duri" makes use of HTML smuggling to deliver malware.

Threatpost - English - Global - threatpost.com