Cybercriminals Weaponize SVG Files to Deliver PureRAT Malware

Cybercriminals are weaponizing SVG files to deliver PureRAT malware, bypassing antivirus and enabling data theft or remote control. Attacks have surged in regions like Russia and Latin America, with variants like PureLogs amplifying damage. Experts urge enhanced defenses, including behavioral analysis, to counter these evolving threats.
Cybercriminals Weaponize SVG Files to Deliver PureRAT Malware
Written by John Marshall

In the shadowy world of cybersecurity, a new wave of sophisticated malware campaigns is exploiting seemingly innocuous file formats to infiltrate systems worldwide. Researchers have uncovered how scalable vector graphics (SVG) files, typically associated with benign web design, are being weaponized to deliver potent remote access trojans like PureRAT. This tactic represents a clever evolution in cyber threats, allowing attackers to bypass traditional antivirus defenses and deploy payloads that steal sensitive data or grant unauthorized control over infected machines.

According to a recent investigation detailed in The Hacker News, security experts at VirusTotal identified 523 malicious SVG files circulating since August 2025, many of which evaded detection by major antivirus programs. These files often embed base64-encoded phishing pages or scripts that, when opened, redirect users to fraudulent sites or initiate downloads of secondary malware. The surge in such attacks highlights a growing trend where cybercriminals repurpose everyday digital assets for nefarious purposes, particularly targeting regions like Latin America and Russia.

Escalating Threats from PureRAT Variants

The PureRAT malware, a versatile remote access tool, has seen a dramatic fourfold increase in attacks on Russian firms in 2025, as reported in another analysis from The Hacker News. Attackers deploy it via email lures disguised as legitimate business correspondence, often bundling it with infostealers like PureLogs to harvest credentials and financial data. This dual-payload approach amplifies the damage, enabling everything from espionage to ransomware deployment.

What makes PureRAT particularly insidious is its lineage and adaptability. Originating from tools like PureHVNC, it has evolved into a full suite including crypters and builders, as exposed in a deep dive by Check Point Research. Developers behind it even host source code on GitHub, masquerading as open-source projects to evade scrutiny, which allows rapid modifications and proliferation among threat actors.

The Role of SVG in Evasion Tactics

SVG files’ vector-based nature makes them ideal for hiding malicious code without triggering alarms, a method that’s gaining traction in campaigns across Latin America, per insights from GBHackers. When users interact with these files—perhaps embedded in emails or websites—the embedded scripts execute silently, deploying RATs like PureRAT or even macOS-targeted stealers such as AMOS. This bypasses endpoint protections that focus on executable files, exposing vulnerabilities in both enterprise and consumer environments.

Industry insiders note that this convergence of SVG exploitation and RAT deployment underscores a broader shift toward fileless malware techniques. For instance, Security Boulevard has linked PureRAT to variants like ResolverRAT, which incorporate features for keystroke logging, webcam access, and persistent remote control, making them tools of choice for financially motivated hackers.

Implications for Global Cybersecurity Defenses

The implications are profound for organizations, especially in critical sectors like telecommunications and finance, where similar tactics have compromised dozens of devices, as seen in operations by groups like UNC1549 detailed in The Hacker News. Defenders must now prioritize behavioral analysis over signature-based detection, integrating tools that scrutinize file metadata and script execution in real-time.

As these threats evolve, collaboration between platforms like VirusTotal and research firms becomes crucial. Experts warn that without updated protocols, such as enhanced email filtering and user education on file handling, the proliferation of SVG-delivered PureRAT could lead to widespread data breaches, urging a proactive stance from both tech giants and regulatory bodies to stem this rising tide.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us