SVG Files Used to Deploy Phishing Pages in Colombian Judicial System Impersonation Campaign
Summary
Hide β²
Show βΌ
A malware campaign leveraging SVG files to deploy Base64-encoded phishing pages impersonating the Colombian judicial system has been identified. The SVG files, distributed via email, execute JavaScript payloads to inject phishing pages and download ZIP archives. The campaign involves 523 unique SVG files that have evaded detection by antivirus engines. The earliest sample dates back to August 14, 2025. The campaign highlights the evolving tactics used by threat actors to bypass security measures and target macOS systems with information stealers like Atomic macOS Stealer (AMOS). This campaign also coincides with broader trends in cyber threats targeting macOS and gamers.
Timeline
-
06.09.2025 21:58 π° 1 articles
VirusTotal Identifies 523 SVG Files in Campaign
VirusTotal discovered a phishing campaign hidden in SVG files that impersonate Colombia's judicial system to deliver malware. The campaign uses SVG files to render fake portals simulating a document download process, ultimately prompting users to download a password-protected ZIP archive. The extracted file contains a legitimate executable, a malicious DLL, and two encrypted files. The malicious DLL is sideloaded to install further malware on the system. VirusTotal identified 523 previously uploaded SVG files that were part of the same campaign but had evaded detection by security software. The addition of SVG support to AI Code Insights was crucial in exposing this campaign, as it helped identify new malicious campaigns more efficiently.
Show sources
- VirusTotal finds hidden malware phishing campaign in SVG files β www.bleepingcomputer.com β 06.09.2025 21:58
-
05.09.2025 09:13 π° 1 articles
SVG Files Used to Deploy Phishing Pages in Colombian Judicial System Impersonation Campaign
A malware campaign leveraging SVG files to deploy Base64-encoded phishing pages impersonating the Colombian judicial system has been identified. The SVG files, distributed via email, execute JavaScript payloads to inject phishing pages and download ZIP archives. The campaign involves 44 unique SVG files that have evaded detection by antivirus engines. The earliest sample dates back to August 14, 2025.
Show sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
Information Snippets
-
The campaign uses SVG files to distribute phishing pages impersonating the Colombian judicial system.
First reported: 05.09.2025 09:13π° 2 sources, 2 articlesShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
- VirusTotal finds hidden malware phishing campaign in SVG files β www.bleepingcomputer.com β 06.09.2025 21:58
-
The SVG files execute JavaScript payloads to inject Base64-encoded HTML phishing pages.
First reported: 05.09.2025 09:13π° 2 sources, 2 articlesShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
- VirusTotal finds hidden malware phishing campaign in SVG files β www.bleepingcomputer.com β 06.09.2025 21:58
-
The phishing pages simulate a document download process while downloading a ZIP archive in the background.
First reported: 05.09.2025 09:13π° 2 sources, 2 articlesShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
- VirusTotal finds hidden malware phishing campaign in SVG files β www.bleepingcomputer.com β 06.09.2025 21:58
-
44 unique SVG files have remained undetected by antivirus engines due to obfuscation and polymorphism.
First reported: 05.09.2025 09:13π° 2 sources, 2 articlesShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
- VirusTotal finds hidden malware phishing campaign in SVG files β www.bleepingcomputer.com β 06.09.2025 21:58
-
The earliest SVG sample dates back to August 14, 2025.
First reported: 05.09.2025 09:13π° 1 source, 1 articleShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
-
The campaign is part of a broader trend targeting macOS systems with information stealers like AMOS.
First reported: 05.09.2025 09:13π° 1 source, 1 articleShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
-
AMOS can steal credentials, browser data, cryptocurrency wallets, and other sensitive information from macOS systems.
First reported: 05.09.2025 09:13π° 1 source, 1 articleShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
-
Threat actors are using ClickFix tactics to bypass macOS Gatekeeper protections.
First reported: 05.09.2025 09:13π° 1 source, 1 articleShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
-
A separate campaign targeting gamers with StealC stealer and crypto theft malware has netted over $135,000.
First reported: 05.09.2025 09:13π° 1 source, 1 articleShow sources
- VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages β thehackernews.com β 05.09.2025 09:13
Similar Happenings
Axios Abuse and Salty 2FA Kits in Microsoft 365 Phishing Campaigns
Threat actors are leveraging HTTP client tools like Axios and Microsoft's Direct Send feature to execute advanced phishing campaigns targeting Microsoft 365 environments. These campaigns have demonstrated a 70% success rate, bypassing traditional security defenses and exploiting authentication workflows. The attacks began in July 2025 and have targeted executives and managers in various sectors, including finance, healthcare, and manufacturing. The phishing campaigns use compensation-themed lures to trick recipients into opening malicious PDFs containing QR codes that direct users to fake login pages. Additionally, a phishing-as-a-service (PhaaS) offering called Salty 2FA is being used to steal Microsoft login credentials and bypass multi-factor authentication (MFA). The Salty2FA kit includes advanced features such as subdomain rotation, dynamic corporate branding, and sophisticated evasion tactics to enhance its effectiveness and evade detection. Salty2FA activity began gaining momentum in June 2025, with early traces possibly dating back to MarchβApril 2025. The campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. Salty2FA targets industries including finance, energy, telecom, healthcare, government, logistics, IT consulting, education, construction, chemicals, industrial manufacturing, real estate, consulting, metallurgy, and more.
MostereRAT Malware Disables Security Tools, Targets Japanese Windows Users
A new malware campaign, tracked as MostereRAT, targets Japanese Windows users with sophisticated evasion techniques. MostereRAT disables antivirus and endpoint defenses, uses an obscure programming language, and abuses legitimate remote access tools to maintain persistent control over compromised systems. The malware's capabilities include privilege escalation, keylogging, data exfiltration, and the creation of hidden administrator accounts. The campaign's long-term objectives and the full extent of its impact remain unclear. MostereRAT employs Easy Programming Language (EPL) to evade detection and uses Windows Filtering Platform (WFP) filters to block security telemetry. The malware deploys legitimate remote access tools like AnyDesk, TigerVNC, and TightVNC, making it difficult to detect. The campaign highlights the importance of removing local administrator privileges and blocking unapproved remote access tools to reduce the attack surface. The malware uses mutual TLS (mTLS) to secure command-and-control (C2) communications and can run as TrustedInstaller, a built-in Windows system account with elevated permissions. MostereRAT can monitor foreground window activity associated with Qianniu - Alibaba's Seller Tool, facilitate RDP logins, and create hidden administrator accounts.
Kazakhstan's KazMunayGas Phishing Test Mistaken for Noisy Bear Campaign
Kazakhstan's state-owned oil and gas company KazMunayGas conducted a phishing test in May 2025, which was initially misinterpreted as a cyber espionage campaign by a new threat group named Noisy Bear. The test involved phishing emails targeting KazMunayGas employees with fake documents related to internal communications and policy updates. The phishing emails were sent from a compromised internal email address and included a ZIP attachment with a Windows shortcut (LNK) downloader, a decoy document, and a README.txt file with instructions. The campaign was designed to mimic official internal communications and included themes such as policy updates, internal certification procedures, and salary adjustments. The phishing test was conducted to train employees on identifying and responding to phishing attempts. However, it was mistakenly reported as a cyber espionage campaign by Seqrite Labs, which attributed the activity to a new threat group tracked as Noisy Bear. The threat actor was believed to be of Russian origin and had been active since at least April 2025. The misinterpretation led to speculation about the involvement of a new threat group and the use of sophisticated malware, including a PowerShell loader dubbed DOWNSHELL and a DLL-based implant. The threat actor used a compromised email address belonging to a KazMunayGas finance department employee to send phishing emails. The phishing emails impersonated mundane company business, including reviewing work schedules, incentive systems, and wages. The phishing emails contained a ZIP file with a decoy document and a shortcut (LNK) file named "Salary Schedule.lnk." The LNK file downloaded a batch script, which retrieved the attackers' PowerShell loader named DownShell. DownShell consists of two scripts: one for anti-analysis by undermining the Windows Antimalware Scan Interface (AMSI), and another for CreateRemoteThread Injection to establish a reverse shell. Noisy Bear used a sanctioned Russian bulletproof hosting provider, Aeza Group, to maintain its infrastructure. The threat activity carries geopolitical implications, targeting Kazakhstan's largest oil and gas company, which is state-owned and a significant economic entity. Seqrite Labs found infrastructure and tooling overlaps across other Central Asian attacks, indicating a broader campaign. The incident highlights the importance of clear communication and coordination between cybersecurity researchers and organizations to avoid misinterpretations and ensure accurate reporting of cyber threats.
APT28 deploys NotDoor backdoor via Microsoft Outlook
APT28, a Russian state-sponsored threat group, has been using a new backdoor malware called NotDoor to target Microsoft Outlook. The malware exploits Outlook as a covert communication, data exfiltration, and malware delivery channel. NotDoor is a VBA macro that monitors incoming emails for specific trigger words. When triggered, it allows attackers to exfiltrate data, upload files, and execute commands on the victim's computer. The malware is delivered via a legitimate signed binary, Microsoft's OneDrive.exe, vulnerable to DLL sideloading. The backdoor was identified by researchers from Lab52, the threat intelligence arm of Spanish cybersecurity firm S2 Grupo. The malware has been deployed against companies in NATO member countries, using advanced techniques to evade detection and maintain persistence. NotDoor supports multiple commands for data exfiltration and file uploads, and uses Base64-encoded PowerShell commands for various operations. The malware creates a staging folder in the %TEMP% directory to store and exfiltrate files, encoding them with custom encryption before sending via email. APT28's attacks involve the abuse of Microsoft Dev Tunnels for C2 infrastructure, providing stealth and rapid infrastructure rotation. The attack chain includes the use of bogus Cloudflare Workers domains to distribute additional payloads, demonstrating a high level of specialized design and obfuscation.
Malicious npm packages exploit Ethereum smart contracts to target crypto developers
Two malicious npm packages, colortoolsv2 and mimelib2, were uploaded in July 2025 and used Ethereum smart contracts to deliver malware to crypto developers. The packages were part of a sophisticated campaign targeting the software supply chain, leveraging GitHub repositories to appear legitimate. The campaign is linked to the Stargazers Ghost Network, a distribution-as-service (DaaS) offering. The packages were designed to fetch and run a next-stage payload from an attacker-controlled server, using Ethereum smart contracts to stage the URLs hosting the payload. The GitHub repositories associated with the campaign were named to attract cryptocurrency developers and users, suggesting a targeted approach to social engineering and deception. The campaign highlights the evolving tactics of threat actors in evading detection and exploiting the software supply chain.