Shadow Vector – SVG Smuggling

13642358885?profile=RESIZE_400xA phishing malware campaign, known as Shadow Vector, has been reported, targeting users in Colombia through malicious SVG files disguised as urgent court notifications. The campaign uses the MITRE ATT&CK technique known as SVG smuggling, where scalable vector graphics are used to embed or link malicious content.  It begins with spear-phishing emails containing SVG attachments, which, when rendered in a browser, redirect victims to download payloads from public platforms like Bitbucket, Dropbox, and others.[1]

These payloads are typically password-protected archives containing a blend of legitimate executables and malicious DLLs.  The infection chain utilizes JavaScript and PowerShell stagers to initiate a multi-stage attack flow, involving DLL side-loading, UAC bypass, process injection, and loaders similar to the Katz Loader. Ultimately, the malware delivers AsyncRAT and RemcosRAT, granting attackers full remote access, enabling credential theft and keylogging, and setting the stage for potential ransomware deployment.

Shadow Vector - In the ever-evolving landscape of cyber threats, attackers continuously refine their tactics to exploit vulnerabilities and deceive unsuspecting victims.  One such emerging campaign has taken a particularly insidious approach, leveraging innovative methods to infiltrate systems and compromise security.  This new vector of attack exemplifies the sophistication and persistence characterizing modern cybercrime.

Shadow Vector has been particularly effective in exploiting a combination of technical vulnerabilities and human behavior. The use of SVG smuggling, a technique that exploits the flexibility of Scalable Vector Graphics (SVG) files, represents a calculated move to bypass traditional security filters. By embedding malicious links within seemingly innocuous files, attackers leverage spear-phishing campaigns to lure victims into their trap.  Once activated, the campaign directs users to payloads hosted on trusted platforms, masking its malicious intent through the guise of legitimacy.

The implications of Shadow Vector emphasize the importance of robust cybersecurity measures tailored to combat such adaptive threats. As malicious actors shift their strategies, the ability to identify and neutralize emerging techniques, such as SVG smuggling, becomes paramount for organizations and individuals alike. Advanced threat detection, comprehensive user training, and adaptive security frameworks are vital in countering innovative cyberattacks like Shadow Vector.

Organizations must closely monitor email gateways and implement stringent filtering techniques to detect and block SVG files containing potentially harmful content.  Additionally, security teams should conduct regular awareness training to educate users about the risks associated with email attachments that appear legitimate but may conceal malicious intent.  This proactive approach can help reduce the chances of successful infiltration by malware campaigns, such as Shadow Vector, which exploit both technical vulnerabilities and social engineering tactics.

To further mitigate such threats, enterprises must stay vigilant by continuously updating their incident response playbooks and integrating advanced threat intelligence tools into their cybersecurity strategies.  Leveraging behavioral analytics can offer deeper insights into suspicious activities and provide timely alerts, enabling swift action against evolving vectors of attack.SVG Smuggling

SVG smuggling is an innovative cyberattack technique that uses Scalable Vector Graphics (SVG) files to embed or link malicious content.  In the context of the Shadow Vector campaign, attackers leverage spear-phishing emails with malicious SVG attachments that, when rendered in a browser, redirect victims to download malware payloads from trusted public platforms, such as Bitbucket and Dropbox.

The infection chain typically involves:

  • Embedding malicious links within SVG files to bypass traditional security filters.
  • Payloads are delivered as password-protected archives containing both legitimate executables and malicious DLLs.
  • Use of JavaScript and PowerShell stagers for a multi-stage attack flow, employing techniques such as DLL side-loading, UAC bypass, process injection, and loaders akin to Katz Loader.
  • End payloads delivering AsyncRAT and RemcosRAT, enabling remote access, credential theft, keylogging, and potential ransomware deployment.


This method combines technical exploitation and social engineering to significant effect, emphasizing the need for organizations to adopt advanced threat detection systems, train users about phishing risks, and enhance email filtering strategies to combat this adaptive cyber threat effectively.

Threat identification to be followed (Symantec):

  • Adaptive-based / ACM.Ps-Rd32!g1
  • Behavior-based / SONAR.SuspDriver!g30
  • Carbon Black-based

For example, associated malicious indicators can be blocked and detected by existing policies within VMware Carbon Black products.  The recommended policy, at a minimum, is to block all types of malware from executing (Known, Suspect, and PUP) as well as delay execution for cloud scanning to maximize the benefit from the VMware Carbon Black Cloud reputation service.

File-based

Phish.Html / Scr.MalSvg!gen2

Trojan Horse / Trojan.Gen.NPE / Trojan.Remcos

Web.Reputation.1

WS.Malware.1

Machine Learning-based

  • AdvML.A!300
  • AdvML.A!400
  • AdvML.A!500
  • AdvML.B!100
  • AdvML.B!200
  • AdvML.C
  • Web-based

Observed domains/IPs are covered under security categories (Symantec) in all WebPulse-enabled products.

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  We provide indicators of compromise information via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5207428251321676122

 

[1] https://www.broadcom.com/support/security-center/protection-bulletin

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!