085. Hunting for Malicious SVG Files

Hello everyone! Let's talk about SVG files. Recently many adversaries leveraged it in their phishing campaigns.

What's more, in many cases the threat actors leveraged files with double extension, for example, New Purchase Order__pdf.svg. This files contain obfuscated JavaScript code, which collects credentials and transmits it to the attacker-controlled server.

Double extension makes it really easy to detect:

event_type: "filecreatewin"

AND

file_name: ("pdf" AND "svg")

Of course, adversaries may use just .svg extension, so you can hunt for SVG files creation events in locations common for file downloading, such as Downloads, Desktop, Documents, etc.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge