{"id":74706,"date":"2025-07-19T06:36:10","date_gmt":"2025-07-19T06:36:10","guid":{"rendered":"https:\/\/www.europesays.com\/us\/74706\/"},"modified":"2025-07-19T06:36:10","modified_gmt":"2025-07-19T06:36:10","slug":"delete-any-emails-that-include-these-images-on-your-phone-or-pc","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/74706\/","title":{"rendered":"Delete Any Emails That Include These Images On Your Phone Or PC"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/07\/1752906970_314_960x0.jpg\" alt=\"Man on his cellphone in the dark.\" data-height=\"2742\" data-width=\"4106\" style=\"position:absolute;top:0\"\/><\/p>\n<p class=\"color-body light-text\" role=\"button\">You will not see this attack.<\/p>\n<p>getty<\/p>\n<p>Republished on July 19 with new analysis into this dangerous image email attack.<\/p>\n<p>Here we go again. There\u2019s a fast growing threat in your inbox that\u2019s hard to detect \u2014 even for security software on your PC. This has \u201c<a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/20\/delete-any-email-on-your-pc-phone-that-has-these-3-letters\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/20\/delete-any-email-on-your-pc-phone-that-has-these-3-letters\/\" target=\"_self\" aria-label=\"seemingly come out of nowhere\" rel=\"noopener\">seemingly come out of nowhere<\/a>,\u201d but you need to be aware. And it means deleting a raft of incoming emails.<\/p>\n<p>The new warning comes courtesy of <a class=\"color-link\" href=\"https:\/\/www.ontinue.com\/resource\/blog-svg-smuggling\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.ontinue.com\/resource\/blog-svg-smuggling\/\" aria-label=\"Ontinue\">Ontinue<\/a>, which says \u201cthreat actors are increasingly leveraging Scalable Vector Graphics (SVG) files as a delivery vector for JavaScript-based redirect attacks.\u201d Plenty of these images, \u201ccommonly treated as harmless\u201d contain \u201cembedded script elements\u201d that lead to browser redirects. And that\u2019s a huge risk.<\/p>\n<p>While these images might be .SVG attachments, <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/20\/delete-any-email-on-your-pc-phone-that-has-these-3-letters\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/20\/delete-any-email-on-your-pc-phone-that-has-these-3-letters\/\" target=\"_self\" aria-label=\"as we have seen before\" rel=\"noopener\">as we have seen before<\/a>, they could also be links to external images pulled into the email. And the campaign also relies on spoofed domains and email lures to trick users into opening and engaging.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-5\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/18\/ios-26-apples-iphone-upgrade-may-be-bad-news-for-google\/\" target=\"_blank\" aria-label=\"Apple\u2019s Next iPhone Upgrade May Be Bad News For Google\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/18\/ios-26-apples-iphone-upgrade-may-be-bad-news-for-google\/\">ForbesApple\u2019s Next iPhone Upgrade May Be Bad News For GoogleBy Zak Doffman<\/a><\/p>\n<p>As <a class=\"color-link\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/02\/05\/svg-phishing\/?amp=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/news.sophos.com\/en-us\/2025\/02\/05\/svg-phishing\/?amp=1\" aria-label=\"Sophos\">Sophos<\/a> explains, the SVG file format \u201cis designed as a method to draw resizable, vector-based images on a computer. By default, SVG files open in the default browser on Windows computers. But SVG files are not just composed of binary data, like the more familiar JPEG, PNG, or BMP file formats. SVG files contain text instructions in an XML format for drawing their pictures in a browser window.\u201d<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/vipre.com\/wp-content\/uploads\/2025\/04\/VIPRE_2025_Q1_Email-Threat-Report_US-APRIL25.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/vipre.com\/wp-content\/uploads\/2025\/04\/VIPRE_2025_Q1_Email-Threat-Report_US-APRIL25.pdf\" aria-label=\"VIPRE\">VIPRE<\/a> warns that \u201cup until this point, SVGs have been recognized by email security tools as generally benign image files, which is why attackers are now having so much success hiding their nefarious exploits in them.\u201d<\/p>\n<p>Looking at these latest attacks, SlashNext\u2019s J Stephen Kowski told me \u201cwhen you open or preview these \u2018images,\u2019 they can secretly redirect your browser to dangerous websites without you knowing.\u201d That means you need to be \u201cextra careful\u201d with images.<\/p>\n<p>Because these attackers leverage spoofed domains and senders to trick you, it isn\u2019t as easy as just avoiding emails from unknown senders. Instead, you should delete any email with an .SVG attachment unless you\u2019re expecting it. And you should allow your browser to block external images until you\u2019re certain of their origin.<\/p>\n<p>Kowski says these emails will also likely be \u201cpushy about viewing the image right away,\u201d and while \u201cyour email provider\u2019s built-in security features, such as spam filtering and safe attachments, can help, they\u2019re not perfect against these newer tricks.\u201d<\/p>\n<p class=\"xxxxmsonormal\">Jason Soroko from Sectigo goes even further, warning security teams to \u201ctreat every inbound SVG as a potential executable,\u201d as the surge in such attacks continues.<\/p>\n<p class=\"xxxxmsonormal\">The real threat though lies in user complacency. SVG attacks, VIPRE says, are now tussling with PDFs to become \u201cattackers\u2019 favorite attachments of choice.\u201d These are only images, most users assume, and so no click-throughs, no harm.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/18\/apple-warning-do-not-call-this-number-on-your-iphone\/\" target=\"_blank\" aria-label=\"Apple Warning\u2014Do Not Make These Calls On Your iPhone\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/18\/apple-warning-do-not-call-this-number-on-your-iphone\/\">ForbesApple Warning\u2014Do Not Make These Calls On Your iPhoneBy Zak Doffman<\/a><\/p>\n<p class=\"xxxxmsonormal\">Bambenek Consulting\u2019s John Bambenek says this is \u201ca fresh spin on the technique of using image files for delivering suspect content, in this case, malicious PDFs. The attackers have to rely on complacency (\u201cit\u2019s only an image, it doesn\u2019t execute code\u201d) to lull organizations into accepting this content and getting it on the inside of a network.\u201d<\/p>\n<p class=\"xxxxmsonormal\">Ontinue says \u201cthe observed targets of this campaign fall into B2B Service Providers, including the ones handling valuable Corporate Data regularly, including Financial and Employee data, Utilities, Software-as-a-Service providers that are great social engineering targets as they expect to receive a high volume of emails.\u201d<\/p>\n<p class=\"xxxxmsonormal\">The payload itself \u201cis delivered via an .SVG file that contains a JavaScript block hidden within a CDATA section. The embedded code uses a static XOR key to decrypt a secondary payload at runtime. This decoded script reconstructs and executes a redirect command using the Function() constructor.\u201d<\/p>\n<p class=\"xxxxmsonormal\">And the team warns \u201cthis technique demonstrates how adversaries are shifting away from executable payloads and towards smuggling (HTML and now SVG) techniques. By embedding script logic into image formats and using trusted browser functions, the attack chain avoids triggering traditional behavioral or signature-based alerts.\u201d<\/p>\n<p class=\"xxxxmsonormal\">The emails containing the attachments or links will be simple, \u201cusing a minimal format to avoid detection and provoke curiosity or interaction.\u201d Hijacking poorly protected domains or spoofing others with special characters enhances the lure.<\/p>\n<p class=\"xxxxmsonormal\">\u201cWhile this report and research is valuable to enterprises,\u201d Bambenek says, \u201cand the search valuable for hunt teams, organizations without a security staff or end consumers will remain vulnerable to conventional cybercrime with this technique.\u201d<\/p>\n<p class=\"xxxxmsonormal\">\u201cThis SVG attack vector is exactly what we\u2019ve been tracking,\u201d Kowski warns. \u201cAttackers have exhausted much of the text-based social engineering playbook over the last ten years and are now getting creative with content payloads to execute malicious code.\u201d And this is easily done because \u201cattackers can easily spoof trusted senders, making recipients more likely to open what appears to be an innocent image file.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-6\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/17\/public-wifi-warning-issued-for-all-iphone-and-android-users\/\" target=\"_blank\" aria-label=\"Do Not Use This WiFi Setting On Your iPhone Or Android Phone\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/17\/public-wifi-warning-issued-for-all-iphone-and-android-users\/\">ForbesDo Not Use This WiFi Setting On Your iPhone Or Android PhoneBy Zak Doffman<\/a><\/p>\n<p class=\"xxxxmsonormal\">\u201cThe beauty of SVG files from an attacker\u2019s perspective,\u201d he told me, \u201cis that they look like harmless images but can contain embedded JavaScript that runs the moment someone opens the file in a browser, bypassing traditional email security that focuses on executable attachments.\u201d Which means users need a new defensive playbook.<\/p>\n<p class=\"xxxxmsonormal\">And so the advice is just as simple. If you\u2019re not expecting an email which includes image links or .SVG attachments, delete them from your inbox. \u201cThis campaign highlights a creative pivot in attacker methodology,\u201d the team says, \u201cusing benign file formats to hide malicious logic and evade established detection controls.\u201d<\/p>\n<p class=\"xxxxmsonormal\">Which is another way of saying that you\u2019re your own best defense.<\/p>\n","protected":false},"excerpt":{"rendered":"You will not see this attack. getty Republished on July 19 with new analysis into this dangerous image&hellip;\n","protected":false},"author":3,"featured_media":74707,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[64,52031,20776,6485,52033,52032,29821,29823,67,132,68,6484,6483],"class_list":{"0":"post-74706","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-business","9":"tag-email-warning","10":"tag-gmail-warning","11":"tag-microsoft-attack","12":"tag-microsoft-warning","13":"tag-outlook-warning","14":"tag-pc-attack","15":"tag-pc-warning","16":"tag-united-states","17":"tag-unitedstates","18":"tag-us","19":"tag-windows-attack","20":"tag-windows-warning"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/114878518627031878","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/74706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=74706"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/74706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/74707"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=74706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=74706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=74706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}