SVG Files Used in New Colombian Phishing Campaign Bypass Antivirus

Phishing Attacks Leverage SVG Files and macOS Malware to Bypass Security in Evolving Cybercrime Campaigns

  • Researchers discovered phishing attacks using SVG files to mimic Colombia‘s judicial system.
  • Obfuscated SVG files delivered JavaScript-based payloads, leading to undetected phishing pages and hidden downloads.
  • Over 523 malicious SVG files appeared since August 2025, with evolving payload sizes indicating shifting tactics.
  • Attackers also target macOS users with Atomic macOS Stealer (AMOS), using cracked software sites and terminal commands.
  • Security updates in macOS Sequoia have blocked some attack attempts, but attackers now use new techniques to bypass safeguards.

Cybersecurity experts have reported a wave of phishing campaigns that exploit SVG image files to target users, mainly by pretending to represent the Colombian judicial system. Attackers distribute these SVG files in email attachments, using them to trick recipients into revealing sensitive information.

- Advertisement -

According to VirusTotal, the SVG files contain hidden JavaScript code that injects a fake HTML page imitating the official portal of the Fiscalía General de la Nación, or the Attorney General’s Office in Colombia. This phishing page acts like a government document download service with a fake progress bar. In the background, it downloads a ZIP archive, whose contents remain undisclosed.

The Google-owned security service identified forty-four unique SVG files that evaded antivirus detection through obfuscation, polymorphism (constant changes in the file’s structure), and junk code. In total, researchers found 523 samples of these malicious SVG files as of August 2025. “Looking deeper, we saw that the earliest samples were larger, around 25 MB, and the size decreased over time, suggesting the attackers were evolving their payloads,” VirusTotal stated in its Malware-campaign.html”>report.

At the same time, macOS systems face threats from the Atomic macOS Stealer (AMOS). Attackers lure users looking for cracked apps on sites like haxmac[.]cc, then redirect them to instructions that convince victims to run commands in the Terminal app. These commands deploy AMOS, which can steal credentials, browser information, cryptocurrency wallets, messaging data, VPN settings, and files. Trend Micro noted, “AMOS shows that macOS is no longer a peripheral target.” The company explained that new macOS security requirements, such as Gatekeeper and app notarization, have blocked some attacks but have not stopped Hackers from shifting to command-line delivery methods.

Security updates with macOS Sequoia have made installation of unsigned and malicious .dmg application files more difficult. However, “threat actors quickly pivoted to terminal-based installation methods that proved more effective in bypassing security controls,” Trend Micro reported in their analysis.

- Advertisement -

In a separate campaign, researchers from CyberArk found criminals targeting gamers searching for cheats with malware like StealC and crypto-stealing tools. This operation allegedly netted attackers over $135,000 by pulling digital currency from infected systems. For more details, see CyberArk’s research.

Attackers continue to adapt, using new methods to bypass improved security and maximize stolen data.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Buterin: Ethereum Block Times Could Drop To 2 Seconds

Ethereum co-founder Vitalik Buterin has elaborated on a bold new roadmap aiming to dramatically...

How Wall Street Bitcoin ETFs Weaken Spot Price Link

Bitcoin ETF share creation/redemption by authorized participants does not require immediate Bitcoin purchases or...

Nvidia AI Segment Eyed for $50B by 2030

Analyst Gene Munster estimates 70% of NVIDIA’s revenue currently comes from just eight major...

Bitcoin Demand Surges As Price Nears One-Year Low

Global Google searches for "buy Bitcoin" have hit a five-year peak, a historic signal...

AI models escalate to nukes in 95% of war games

AI models from OpenAI, Anthropic, and Google deployed nuclear weapons in 95% of war-game...

Must Read

Top 5 Best Crypto Faucets To Earn Free Crypto This Year

QUICK LINKSWhat Are Crypto Faucets and How Do They Work?How Do Crypto Faucets Make Money?What to Expect: Realistic EarningsThe Best Crypto Faucets of 2025:...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!