- Sophos says the use of SVG files in phishing is increasing
- SVG -Files BYPASS E -MAIL -Protection and can display malicious hyperlinks
- The researchers shared a few tips on how to remain in safety
Hackers use .SVG files in new phishing -attacks aimed at stealing People’s Office 365 -Login -AdI -Legitimation Information, experts have warned.
A report from researchers at Sophos revealed the number of phishing attacks with .SVG files in attachments is increasing. SVG (scalable vector graphics) Files are XML-based images that can be scaled without losing quality, making them ideal for web design, icons and illustrations. Unlike raster images (eg PNG, JPG), SVG’s mathematical equations use to define shapes so they can remain crispy in any size.
Since SVG files are usually loaded naturally inside a browser, they can contain anchor brands, scripts and other types of active web content.
Defense against SVG -attack
Sophos notices the body of phishing -e emails is nothing extraordinary. It is the usual invoice/new voicemail/signature required Type E email, with a .SVG attachment that usually shows only one sentence or two and a hyperlink. Sophos says it has seen these messages, especially the content inside the SVG file, grows more sophisticated as the campaign progressed.
In any case, the opening of the SVG file brings up a new browser tab and in it a hyperlink. Click on Hyperlink redirects the victim to a fake Office365 -Login -page that steals login -credentials and forward them to attackers.
There are two ways to defend against these phishing -e emails, Sophos said. The best way (except not to click shady email attached files) is to open a known, benign SVG file on the computer and direct Windows to always open it in the Notepad or a similar non-browser program.
“Even if you accidentally click on a malicious SVG in the future, it will only open in the notepad and throw another roadblock in front (potential) that is phisk,” Sophos explained. “If at some point you find out that you have to work with real SVG files, follow the same steps again and choose the graphics application you plan to use.”
The other way is to use a reputable E -mail security program. Sophos said a detection signature was developed for the different kinds of weapons files, the recently observed.