BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Malicious SVG Files Used in Phishing to Spread Crypto Malware

Sophisticated Phishing Campaign Targets Ukraine with Fileless Malware and Cryptocurrency Miners

  • Attackers use phishing emails pretending to be Ukrainian government agencies to deliver Malware.
  • Malicious SVG attachments start a download chain leading to remote access trojans and cryptocurrency mining tools.
  • The main malware involved are CountLoader, Amatera Stealer, and PureMiner, with CountLoader acting as a delivery tool.
  • Malware is developed and spread by a group known as PureCoder, offering products like PureRAT and PureMiner.
  • Researchers highlight growing sophistication in these attacks, including fileless malware that evades detection.

On September 26, 2025, researchers identified a phishing campaign targeting Ukrainian government agencies. Attackers sent emails mimicking official messages from the National Police of Ukraine. The aim was to infect systems with malware used to steal data and mine cryptocurrency.

- Advertisement -

According to a report by Fortinet FortiGuard Labs, the emails contained malicious SVG (Scalable Vector Graphics) attachments. When opened, these files downloaded a password-protected ZIP archive. The ZIP included a Compiled HTML Help (CHM) file, which, when activated, triggered a series of steps leading to the deployment of the CountLoader malware.

CountLoader then delivered two main threats: Amatera Stealer, designed to steal information, and PureMiner, used for illegal cryptocurrency mining. The same campaign used various tools linked to a developer known as PureCoder, who also created malware like PureRAT, PureHVNC RAT, and PureClipper, among others. These programs can allow remote control of infected devices, steal saved information, or redirect cryptocurrency transactions.

Researchers noted that both Amatera Stealer and PureMiner operate as fileless malware, meaning they run without leaving files on a computer’s hard drive. Instead, they execute directly in a computer’s memory. The process involves techniques like .NET Ahead-of-Time (AOT) compilation and process hollowing, or are loaded into memory using Python-based tools.

Amatera Stealer looks for certain files and collects data from popular web browsers and applications like Steam, Telegram, and FileZilla, as well as various cryptocurrency wallets. “This phishing campaign demonstrates how a malicious SVG file can act as an HTML substitute to initiate an infection chain,” Fortinet said. The SVG code led users to a site that triggered further downloads.

- Advertisement -

In a related development, security firm Huntress discovered a group likely based in Vietnam using similar phishing methods targeting recipients with supposed copyright notices. This campaign also used ZIP files, which installed PXA Stealer and eventually PureRAT through several layers of hidden loaders and credential theft.

“This campaign demonstrates a clear and deliberate progression, starting with a simple phishing lure and escalating through layers of in-memory loaders, defense evasion, and credential theft,” said security researcher James Northey in his report. The attacks show a move from basic techniques to more advanced methods using modular, commercial malware.

For further details, see the full Fortinet FortiGuard Labs report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Tether funds Drift hack victims in swap for USDT adoption

Tether will donate $127.5 million to help Solana-based exchange Drift Protocol recover $286 million...

Russia-linked crypto exchange Grinex shuts down after $13M hack

The sanctioned Russia-linked crypto exchange Grinex has halted operations after a major hack resulted...

Hayes: U.S.-Iran Conflict May Tank Bitcoin Before Liquidity Surge

Arthur Hayes described markets as being in a 'no trade zone' due to geopolitical...

Justin Sun decries “tyranny” in Trump-linked WLFI vote

World Liberty Financial proposed burning 4.5 billion WLFI tokens and restructuring vesting for 62...

Crypto Market-Maker Deal Disclosures Virtually Absent

Market-making arrangements are disclosed by fewer than 1% of crypto protocols, a rate dramatically...

Must Read

Top 9 VPNs That Accept Bitcoin And Crypto

CyberGhost | FastVPN | TorGuard | Private Internet Access | ExpressVPN | NordVPN | Private VPN | SurfShark | AirVPN | Why Buy VPN...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading