New SVG Phishing Malware Emerges with Advanced Anti-Analysis Techniques
South Korean security firm AhnLab has announced the discovery of a sophisticated new phishing malware that utilizes the SVG file format. This emerging threat incorporates multiple techniques specifically designed to circumvent security measures and resist analysis by researchers.
On March 28, 2025, AhnLab revealed details about a newly discovered phishing malware that leverages Scalable Vector Graphics (SVG) format. What makes this malware particularly concerning is its arsenal of anti-analysis features that allow it to evade traditional security protections.
SVG is an XML-based vector image format commonly used across the web for icons, logos, and graphics. Because SVG files can incorporate CSS and JavaScript, threat actors are increasingly exploiting this functionality to embed malicious scripts within seemingly innocent image files.
AhnLab’s Security Intelligence Center (ASEC) had previously reported on SVG-format malware in November 2024, but this latest discovery demonstrates a significant evolution in sophistication and evasion techniques.
The malicious SVG files are disguised with business-related filenames to appear legitimate. Researchers have identified several examples of filenames used in active attacks:
The latest SVG malware embeds Base64-encoded data within the src attribute of script tags. While this technique is typically used for embedding images in web pages, attackers are repurposing it to bypass security controls. When decoded, the embedded code contains malicious redirect URLs designed to lead users to fraudulent authentication pages.
What makes this malware particularly sophisticated is its comprehensive set of anti-analysis features:
The malware checks the UserAgent of visitors and redirects to blank pages if it detects:
To prevent security researchers from examining the code, the malware disables shortcut keys that would open developer tools.
The malware disables right-click functionality, making it harder for users to inspect elements or save content for analysis.
Using the performance.now() function, the code measures execution time. If it detects delays that might indicate a debugger is present, it automatically redirects to a legitimate website to avoid scrutiny.
When users manage to bypass these anti-analysis mechanisms and click the CAPTCHA authentication button, a GET request is sent to a specific URL, triggering additional malicious processes. While the exact details of the response remain unclear, researchers believe it likely leads to a phishing site impersonating Microsoft’s login page.
SVG-format malware continues to evolve and increase in prevalence. These files are frequently distributed as email attachments, creating significant risk for organizations and individuals alike.
Security experts advise:
As this threat continues to evolve, organizations should remain vigilant and ensure their security controls are equipped to detect and block these increasingly sophisticated attacks.