Hackers are now using SVG files, a type of image file, for phishing attacks to trick people into sharing their Office 365 login credentials.
SVG files, commonly used for logos and illustrations, are built using XML text instructions, which can be exploited by cybercriminals.
In SVG phishing attacks, a malicious code runs in the background when the file is opened in a web browser, leading to a fake Office 365 login page and credential theft.
To protect against SVG malware and phishing attempts, it is important to train employees about the threat, change how SVG files open, and strengthen email security.