The problem with sophisticated file formats that can contain executable browser instructions is that they can be weaponized in sophisticated ways

The attacks works via a multi-step process:

  1. An email containing a weaponized SVG file as an attachment is sent out to potential victims
  2. The attachment, if downloaded and opened, launches a predefined browser on the victim’s device by default
  3. As the SVG file contains web links or JavaScript code that redirects the browser to a site hosting a phishing kit, the target is exposed to phishing risks
  4. The use of a CloudFlare captcha challenge is used to convince the target that the gated destination is legitimate and therefore safe
  5. Most targets end up on a phishing web page that indicates they must click a button to open or read a document hosted on DocuSign, Dropbox, RingCentral or SharePoint, or Google Voice. Fake but realistic-looking login dialog boxes for these services are then launched to convince the target to enter login credentials
  6. Some of the malicious SVG attachments analyzed even contained password-protected ZIP archives containing a malware executable (an AutoIt script that sets up and installs a keystroke logger) that run on the Windows operating system