Phishing Fiasco: Ukrainian Agencies Impersonated in SVG Malware Mayhem
In a new twist on phishing, attackers impersonate Ukrainian government agencies, using malicious SVG files to drop CountLoader. This leads to the deployment of Amatera Stealer and PureMiner, proving even hackers appreciate a good fileless execution. Welcome to the digital age, where even your graphics can be out to get you.

Hot Take:
Who knew that SVG files could be as dangerous as they are dull? These attackers are getting crafty, using art files to deliver malware—looks like they’re turning phishing into a fine art! Next thing you know, we’ll have to start worrying about interpretive dance-based cyber attacks.
Key Points:
- Phishing campaign impersonates Ukrainian government, using SVG files to deceive recipients.
- SVG files initiate download of ZIP archives containing CHM files, leading to CountLoader deployment.
- CountLoader serves as a vector for Amatera Stealer and PureMiner, both fileless threats.
- PureCoder’s suite includes PureHVNC RAT, PureMiner, PureCrypter, and more.
- Parallel campaign observed using copyright infringement themes to deploy PureRAT.
Already a member? Log in here