SVG Files Used in New Colombian Phishing Campaign Bypass Antivirus

Phishing Attacks Leverage SVG Files and macOS Malware to Bypass Security in Evolving Cybercrime Campaigns

  • Researchers discovered phishing attacks using SVG files to mimic Colombia‘s judicial system.
  • Obfuscated SVG files delivered JavaScript-based payloads, leading to undetected phishing pages and hidden downloads.
  • Over 523 malicious SVG files appeared since August 2025, with evolving payload sizes indicating shifting tactics.
  • Attackers also target macOS users with Atomic macOS Stealer (AMOS), using cracked software sites and terminal commands.
  • Security updates in macOS Sequoia have blocked some attack attempts, but attackers now use new techniques to bypass safeguards.

Cybersecurity experts have reported a wave of phishing campaigns that exploit SVG image files to target users, mainly by pretending to represent the Colombian judicial system. Attackers distribute these SVG files in email attachments, using them to trick recipients into revealing sensitive information.

- Advertisement -

According to VirusTotal, the SVG files contain hidden JavaScript code that injects a fake HTML page imitating the official portal of the Fiscalía General de la Nación, or the Attorney General’s Office in Colombia. This phishing page acts like a government document download service with a fake progress bar. In the background, it downloads a ZIP archive, whose contents remain undisclosed.

The Google-owned security service identified forty-four unique SVG files that evaded antivirus detection through obfuscation, polymorphism (constant changes in the file’s structure), and junk code. In total, researchers found 523 samples of these malicious SVG files as of August 2025. “Looking deeper, we saw that the earliest samples were larger, around 25 MB, and the size decreased over time, suggesting the attackers were evolving their payloads,” VirusTotal stated in its Malware-campaign.html”>report.

At the same time, macOS systems face threats from the Atomic macOS Stealer (AMOS). Attackers lure users looking for cracked apps on sites like haxmac[.]cc, then redirect them to instructions that convince victims to run commands in the Terminal app. These commands deploy AMOS, which can steal credentials, browser information, cryptocurrency wallets, messaging data, VPN settings, and files. Trend Micro noted, “AMOS shows that macOS is no longer a peripheral target.” The company explained that new macOS security requirements, such as Gatekeeper and app notarization, have blocked some attacks but have not stopped Hackers from shifting to command-line delivery methods.

Security updates with macOS Sequoia have made installation of unsigned and malicious .dmg application files more difficult. However, “threat actors quickly pivoted to terminal-based installation methods that proved more effective in bypassing security controls,” Trend Micro reported in their analysis.

- Advertisement -

In a separate campaign, researchers from CyberArk found criminals targeting gamers searching for cheats with malware like StealC and crypto-stealing tools. This operation allegedly netted attackers over $135,000 by pulling digital currency from infected systems. For more details, see CyberArk’s research.

Attackers continue to adapt, using new methods to bypass improved security and maximize stolen data.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

JPMorgan Projects Gold Skyrocketing to $8,000 by 2030

JP Morgan projects Gold (XAU/USD) could surge to $8,000 by 2030, a prediction following...

Crypto VC Inflows Hit $1.4B Through Early 2026

Institutional and venture capital commitments to crypto companies reached $1.4 billion at the start...

Brazil Sells $61B in US Treasuries, Buys Gold in 2026

Brazil sold $61 billion in U.S. Treasury securities in 2026, using the proceeds to...

U.S. Sanctions Crypto Exchanges Aiding Iran’s Regime

The U.S. Treasury Department has, for the first time, sanctioned entire cryptocurrency exchanges under...

US sanctions crypto exchanges tied to Iran in first move

The U.S. Treasury sanctioned two UK-registered crypto exchanges for the first time under its...
- Advertisement -

Must Read

The 13 Best Crypto Advertising Networks to Grow Your Project

TABLE OF CONTENTSWhy Traditional Ad Networks (Like Google & Facebook) Fail CryptoQuick-View Comparison TableHow to Choose the Right Crypto Ad Network for Your ProjectBest...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!