cyberplace.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Cybersecurity, fandom, video games, technology, dog photos and most importantly, you.

Server stats:

965
active users

Fellows

If you’re not blocking SVG (Scalable Vector Graphic) attachments in email messages you might want to.

I have observed something I haven’t yet seen. Malicious email messages where the attachment the threat actor wants the target to open is a SVG file pretending to be an agreement.

The SVG file when loaded makes a HTTP call to load a remote image, it also contains a transparent layer which links to the malicious website.

Looks to be an attempt at evading detection.

@fellows jep, can confirm. We‘re seeing things Like that also. Just make sure to check your Logs before blocking so you don‘t get aaaangry calls from Marketing.

@fellows We had some of those at the end of last year and also blocked SVG attachments.

@fellows
SVGs supports JavaScript by Default/Standard. Go figure…

@rtificial all that’s in the SVG file is a height and width tag, image tag pointing to the lure image, and an a click tag pointing to the malicious website. There was no scripting in the file.

@fellows oh word. Thanks for the additional info. Last month I was on a pentest and using svg files with xss payloads. But yea, you’re right it’s best to block those files or sandbox and sanitize them.

@rtificial I’ve now seen my first SVG file where there’s script inside src=data:application/ecmascript;base64. The decoded base64 is obfuscated further.

@dritsec thanks for passing along the article! I didn’t suspect it was completely new, just the first time I’d seen - hence the original post I made.

@fellows Any idea how to accomplish that with the Thunderbird email client?

@johnhobbs It’s always best to block stuff before it hits the mail client. You could check with your provider to see if they have filtering abilities.

I’m not familiar with Thunderbird, but you might be able to create rules that would run when email is downloaded.

@frankietankie this would be something done at the mail security level before it reaches the user’s mailbox.

@fellows At least make SVGs not render but require them to be saved to disk.

@fellows Interesting. Never seen it, but will keep an eye out now.

@fellows

Interesting! Does Outlook make the HTTP call itself on rendering?

Got links?

@fellows

JFC
As a person who works *in* SVGs, and exchanges then regularly this is an issue.

@fellows

But... Does it scale???

<I'll show myself out :catgooglyfingerguns: 🚪 >

@fellows I've been working with SVGs for a while now, and I do think they are a little *too* powerful in some cases. You have to be vigilant about malicious code inside SVGs.

@fellows In other words, I'm starting to think there's a lot to be said for neo-luddism.

@fellows@cyberplace.social on a more "classic" way, it can also be used for tracking purposes...