Phishing attacks through SVG image files

Issue 2 2025 News & Events, Information Security

Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images. Opening these files leads a user to phishing pages mimicking Google and Microsoft services, aiming to steal login credentials. There was an almost six-fold increase in phishing via SVG files in March 2025 compared to February, and over 4000 of these emails have been detected globally since the beginning of the year.

SVG is a format for describing two-dimensional vector graphics using XML, a markup language that provides rules to define any data. Unlike JPEG or PNG image formats, SVG supports JavaScript and HTML. This makes it easier for designers to work with non-graphical content like text, formulas, and interactive elements. However, attackers exploit this by embedding scripts with links to phishing pages within the image file. Users might open these files out of curiosity, thinking they are images.

The attached SVG file is essentially an HTML page with no graphics description. When opened in a web browser, this file appears as a web page with a link that supposedly points to an audio file. Clicking on this redirects the user to a phishing page mimicking a Google Voice audio recording, with the audio track actually being a static image. Clicking "Play Audio" further redirects users to a corporate email login page, allowing attackers to capture their credentials. This page, too, mentions Google Voice. The page also includes the target company's logo, aiming to lower the user's guard.

In a separate instance, attackers presented an SVG attachment as a document that required review and signature, mimicking a notification from an e-signature service.

Unlike the first example, where the SVG file acted as an HTML page, in this case, it contains JavaScript that, when the file is opened, launches a browser window with another fake login phishing site, this time mimicking Microsoft.

“Phishers are relentlessly exploring new techniques to circumvent detection. They vary their tactics, sometimes employing user redirection to confuse, and other times, experimenting with different attachment formats. Attacks with SVG attachments are showing a clear upward trend. While currently these attacks are relatively basic, with SVG files containing either a phishing link page or a redirection script to a fraudulent site, the use of SVG as a container for malicious content can also be employed in more sophisticated targeted attacks,” comments Roman Dedenok, Anti-Spam Expert at Kaspersky.

In order to avoid becoming a victim of phishing or malicious messages, Kaspersky experts advise the following:

• Only open emails and click links if you are sure you can trust the sender.

• When a sender is legitimate, but the content of the message seems strange, it is worth checking with the sender via an alternative means of communication.

• Check the spelling of a website’s URL if you suspect you are faced with a phishing page. The URL may contain mistakes that are hard to spot at first glance, such as a 1 instead of I or 0 instead of O.

• Use a proven security solution when surfing the web.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Entries for the 2026 Southern Africa OSPAs now open
News & Events
Entries are now open through to 1 April 2026 for the Southern Africa Outstanding Security Performance Awards (OSPAs). This year, the awards are open to a broader range of countries in southern Africa than ever before.

Read more...
Grand theft telematics
News & Events
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.