Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
HackTheBox 970x120 1
An SVG file disguised as a PDF led victims to a fake login

An SVG file disguised as a PDF led victims to a fake login

27 September 2025 11:15

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies in the United States.

The malicious SVG file hid its true functionality behind a layer of pseudo-corporate terminology and a simulated analytics dashboard , allowing it to bypass simple checks. Analysis revealed that the code’s structure was uncharacteristic of handwriting and was likely generated by a generative model.

The emails came from a hacked corporate account , with the sender’s address matching the recipient’s, and the actual addresses BCCed. The attachment mimicked a PDF document, but was actually an SVG file with embedded JavaScript . When opened, the file redirected the victim to a CAPTCHA page, which, according to Microsoft, then opened a fake login form to collect passwords.

The main feature of the attack was its unusual obfuscation.

Elements with names like “Business Performance Dashboard” were hidden within the SVG code, remaining invisible due to the complete lack of transparency. Furthermore, the malicious functionality was disguised using a series of business terms (“revenue,” “operations,” “dashboard,” “KPI,” etc.), converted into symbols and commands using a multi-step algorithm. The script redirected the browser to a malicious resource, initiated environmental fingerprinting, and monitored sessions.

Microsoft’s analysis system concluded that the code was most likely generated by artificial intelligence. Among the warning signs were overly descriptive function names with hexadecimal suffixes, excessive modularity and repetitive logic blocks, cumbersome comments in the style of corporate documentation, and the formal use of XML constructs typical of generative models.

Despite the complexity of the disguise, the campaign was blocked by Microsoft Defender cloud protection. Heuristics based on several indicators were activated: suspicious use of BCC, automated emails, an SVG attachment disguised as a PDF, a redirect to the previously detected kmnl[.]cpfcenters[.]de phishing domain, the presence of hidden logic, and session tracking detection.

Microsoft emphasized that the use of AI doesn’t eliminate the ability to detect attacks. On the contrary, synthetic code often leaves behind additional artifacts that can be used for analysis. The company recommends that administrators enable on-click safe link checking, activate Zero-Hour Auto Purge to isolate messages that have already been delivered, use browsers with SmartScreen support, and implement phishing-resistant multi-factor authentication via Microsoft Sign In.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.