HTML smugglers turn to SVG images
By Adam Katz
Published: 2022-12-13 · Archived: 2026-04-05 17:03:50 UTC
Tuesday, December 13, 2022 15:30
HTML smuggling is a technique attackers use to hide an encoded malicious script within an HTML email
attachment or webpage.
Once a victim receives the email and opens the attachment, their browser decodes and runs the script,
which then assembles a malicious payload directly on the victim’s device.
Talos has witnessed Qakbot attackers using a relatively new technique that leverages Scalable Vector
Graphics images embedded in HTML email attachments.
HTML smuggling using SVG
https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/
Page 1 of 7
Smuggling HTML using SVG
There are multiple different ways attackers have been documented abusing the legitimate features of JavaScript
and HTML to accomplish HTML smuggling. Recently, however, Talos has witnessed attackers deploying a
relatively new HTML smuggling technique—the use of Scalable Vector Graphics (SVG) images.
Unlike pixel-based raster images such as JPEG, SVG images are vector-based, which means they can be increased
in size without sacrificing image quality. SVG images are constructed using XML, allowing them to be placed
within HTML using ordinary XML markup tags. Talos has identified malicious emails featuring HTML
attachments with encoded SVG images that themselves contain HTML