- Sofos says that the use of SVG files in phishing is increasing
- SVG files derive email protection and can show malicious hyperlinks
- The researchers shared some tips on how to stay safe
Computer pirates are using .SVG files in new phishing attacks aimed at robbing Office 365 session credentials of the people, experts warned.
A SOFHOS researchers report revealed that the number of phishing attacks with .SVG files in attachments is increasing. SVG files (scalable vector graphics) are XML -based images that can be climbed without losing quality, which makes them ideal for web design, icons and illustrations. Unlike raster images (for example, PNG, JPG), SVG use mathematical equations to define shapes, allowing them to remain clear in any size.
Since SVG files are generally charged natively within a browser, they can contain anchor labels, scripts and other types of active web content.
Defend against SVG attacks
Sofos points out that the body of the PHishing emails is not extraordinary. It is the usual invoice/new voice mail/firm required email type, with an attached .SVG file, which usually only shows a sentence or two, and a hyperlink. Sofos says that he has seen these messages, especially the contents within the SVG file, become more sophisticated as the campaign progressed.
In any case, opening the SVG file brings a new browser tab, and in it a hyperlink. When clicking on the hyperlink, redirect the victim to a fake office login page that steals the login credentials and transmits them to the attackers.
There are two ways to defend against these PHISHING Electronic Posts, Sophos said. The best way (apart from not clicking on shaded email attachments) is Browser
“Even if you accidentally click on a malicious SVG in the future, it will only open in the notes, throwing another obstacle against (potentially) Phished,” Sophos explained. “Yes, at some point, find that you need to work with real SVG files, follow the same steps again and choose the application of graphics you plan to use.”
The second way is to use a good reputation email program. Sofos said that a detection firm was developed for the various types of armed archives that it observed recently.