Phishing SVGs: Unraveling the Web of Obfuscation with a Comedic Twist
In this diary entry about phishing SVG attachments, Didier Stevens shares his quick dynamic analysis technique. He opens the SVG file in a network-disconnected VM, uses Edge’s developer tools, and reveals the deobfuscated URL and payload without the hassle of static analysis.

Hot Take:
Phishers are diving into the deep end of creativity with SVG files, and it looks like they’ve found a way to turn your curiosity into their catch of the day. Who knew that those innocent-looking graphics could pack such a punch? Remember, folks, curiosity killed the cat, and it can also hook the unsuspecting internet user!
Key Points:
- Phishing scammers are increasingly using SVG files with obfuscated JavaScript.
- A quick dynamic analysis was performed using a VM and Edge’s developer tools.
- The SVG file, when opened, reveals a deobfuscated URL and payload.
- SVG phishing is a creative but dangerous twist in the world of cyber threats.
- Didier Stevens shares his approach to safely analyze suspicious SVG files.
Already a member? Log in here