Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/Vulnerabilities/Hackers Weaponize SVG & Office Files to Target Windows
Vulnerabilities

Hackers Weaponize SVG & Office Files to Target Windows

Hackers Weaponize SVG & Office Files to Target Windows Alright, so cybersecurity researchers have just uncovered a pretty sophisticated email campaign. And it’s definitely something to pay...

David kimber
David kimber
January 1, 2026 3 Min Read
9 0

Hackers Weaponize SVG & Office Files to Target Windows

Alright, so cybersecurity researchers have just uncovered a pretty sophisticated email campaign. And it’s definitely something to pay attention to. This campaign is deploying a commodity loader to distribute some seriously nasty stuff: we’re talking Remote Access Trojans and information stealers.

The operation primarily targets manufacturing and government organizations across Italy, Finland, and Saudi Arabia, using highly evasive techniques.

Infection chain
Infection chain

Multi-Vector Attack Strategy

The campaign employs multiple infection methods to compromise Windows systems. Threat actors are distributing weaponized Microsoft Office documents that exploit CVE-2017-11882, a critical memory corruption vulnerability in the Equation Editor component.

Additionally, attackers leverage malicious SVG files and ZIP archives containing LNK shortcuts, all converging on a unified commodity loader infrastructure.

Email with attachment
Email with attachment

The attacks begin with targeted phishing emails masquerading as legitimate Purchase Order communications from business partners.

These deceptive messages contain RAR archives hiding first-stage JavaScript payloads designed to bypass initial security screening.

The malware operates through a sophisticated four-stage execution pipeline engineered to evade detection.

The initial JavaScript file contains heavily obfuscated code that dynamically reconstructs malicious strings using split and join operations. Upon execution, it creates a hidden PowerShell process using Windows Management Instrumentation objects.

Classes present in Clean Task Scheduler (left) appended malicious content (right)
Classes present in Clean Task Scheduler (left) appended malicious content (right)

The second stage retrieves a malicious PNG image from legitimate hosting services such as Archive.org.

This image contains steganographically embedded base64-encoded .NET assemblies hidden at the end of the file. The PowerShell script extracts this payload using a regular expression. It loads it directly into memory without writing to disk.

In the third stage, attackers weaponize the legitimate open-source TaskScheduler library from GitHub.

By appending malicious functions to the source code and recompiling it, they create a trojanized assembly that retains an authentic appearance while embedding malicious capabilities.

The final stage employs process injection techniques, creating a suspended RegAsm.exe process and injecting the decoded payload into its memory space.

This process hollowing allows malware to masquerade as legitimate Windows utilities while executing malicious code.

Payload Delivery and Capabilities

The campaign delivers various information-stealing tools and RATs, including PureLog Stealer, Katz Stealer, DC Rat, Async Rat, and Remcos.

The PureLog Stealer payload is decrypted using Triple DES encryption in CBC mode before being invoked to exfiltrate sensitive data, including browser credentials, cryptocurrency wallet information, and comprehensive system details.

Injecting payload into RegAsm.exe
Injecting payload into RegAsm.exe

Researchers at Cyble Research and Intelligence Labs (CRIL) identified a novel User Account Control (UAC) bypass technique in which malware monitors system process-creation events and opportunistically triggers UAC prompts during legitimate launches, tricking users into granting elevated privileges.

Cross-campaign analysis reveals standardized methodology across multiple threat actors, suggesting the loader operates as a shared delivery framework.

Research from Seqrite, Nextron Systems, and Zscaler documented identical class naming conventions and execution patterns across various malware families, confirming the widespread availability of this infrastructure.

Organizations should implement enhanced email filtering, disable legacy Office equation editor components, scrutinize image attachments, and monitor for suspicious PowerShell activity to mitigate these sophisticated threats.

Tags:

AttackCVECybersecurityExploitHackerMalwarephishingSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

CISA Warns: WinRAR Zero-Day (CVE Vulnerability Exploit

Next Post

Adidas Data Breach: Customers’ Personal Information Exposed

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us