
An SVG file disguised as a PDF led victims to a fake login
Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies in the United States. The malicious SVG file hid its true functionality behind a layer of pseudo-corporate terminology and a simulated analytics dashboard , allowing it to bypass simple checks. Analysis revealed that the code’s structure was uncharacteristic of handwriting and was likely generated by a generative model. The emails came from a hacked corporate account , with the sender’s address matching the recipient’s, and the actual addresses BCCed. The attachment mimicked










