085. Hunting for Malicious SVG Files
Hello everyone! Let's talk about SVG files. Recently many adversaries leveraged it in their phishing campaigns.
What's more, in many cases the threat actors leveraged files with double extension, for example, New Purchase Order__pdf.svg. This files contain obfuscated JavaScript code, which collects credentials and transmits it to the attacker-controlled server.
Double extension makes it really easy to detect:
event_type: "filecreatewin"
AND
file_name: ("pdf" AND "svg")
Of course, adversaries may use just .svg extension, so you can hunt for SVG files creation events in locations common for file downloading, such as Downloads, Desktop, Documents, etc.
See you tomorrow!
Comments
Post a Comment