{"id":25753,"date":"2025-02-05T11:20:58","date_gmt":"2025-02-05T19:20:58","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/02\/05\/news-19476\/"},"modified":"2025-02-05T11:20:58","modified_gmt":"2025-02-05T19:20:58","slug":"news-19476","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2025\/02\/05\/news-19476\/","title":{"rendered":"Scalable Vector Graphics files pose a novel phishing threat"},"content":{"rendered":"<p><strong>Credit to Author: Andrew Brandt| Date: Wed, 05 Feb 2025 17:01:03 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Criminals who conduct phishing attacks over email have ramped up their abuse of a new threat vector designed to bypass existing anti-spam and anti-phishing protection: The use of a graphics file format called SVG.<\/p>\n<p>The attacks, which begin with email messages that have .svg file attachments, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-emails-increasingly-use-svg-attachments-to-evade-detection\/\" target=\"_blank\" rel=\"noopener\">started to spread late last year<\/a>, and have ramped up significantly since mid-January.<\/p>\n<p>The file format is designed as a method to draw resizable, vector-based images on a computer. By default, SVG files open in the default browser on Windows computers. But SVG files are not just composed of binary data, like the more familiar JPEG, PNG, or BMP file formats. SVG files contain text instructions in an XML format for drawing their pictures in a browser window.<\/p>\n<figure id=\"attachment_959588\" aria-describedby=\"caption-attachment-959588\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959588\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png\" alt=\"The content of a legitimate SVG file source alongside a thumbnail\" width=\"640\" height=\"227\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png 1499w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png?resize=300,106 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png?resize=768,273 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image2.png?resize=1024,363 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959588\" class=\"wp-caption-text\">The content of a legitimate SVG file source alongside a thumbnail<\/figcaption><\/figure>\n<p>But because SVG images can load and render natively inside a browser, they can also contain anchor tags, scripting, and other kinds of active web content. In this way, threat actors have been abusing the file format. The SVG files used in the attacks include some instructions to draw very simple shapes, such as rectangles, but also contain an anchor tag that links to a web page hosted elsewhere.<\/p>\n<figure id=\"attachment_959589\" aria-describedby=\"caption-attachment-959589\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959589\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image3.png\" alt=\"A malicious SVG links to a Google Doc file\" width=\"640\" height=\"110\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image3.png 852w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image3.png?resize=300,52 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image3.png?resize=768,133 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959589\" class=\"wp-caption-text\">A malicious SVG links to a Google Docs file<\/figcaption><\/figure>\n<p>When a person unfamiliar with the format double-clicks the attachment in their email, their computer opens the SVG file in their browser. The browser renders both the vector graphics and the anchor tags in a new tab.<\/p>\n<figure id=\"attachment_959590\" aria-describedby=\"caption-attachment-959590\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959590\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png\" alt=\"A simplistic malicious SVG hotlinks the recipient's email and some text to a phishing page\" width=\"640\" height=\"101\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png 1126w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png?resize=300,47 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png?resize=768,121 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image4.png?resize=1024,162 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959590\" class=\"wp-caption-text\">A simplistic malicious SVG hotlinks the recipient&#8217;s email and some text to a phishing page<\/figcaption><\/figure>\n<p>If the target clicks the link embedded in the SVG file, the browser will then open the link, which invariably leads to a social engineering trick designed to lure the target into a situation where they need to log in to an account.<\/p>\n<h3>Social engineering tricks used in SVG phishing attacks<\/h3>\n<p>The subject lines and messages we\u2019ve seen use many tropes common to generic phishing attacks.<\/p>\n<p>One of the patterns being used asserts that the attachment is a legal document that requires a signature. The message subject may use one of the following lines, or something similar:<\/p>\n<ul>\n<li>Completed: [random characters]_Contract_and_Agreement_[numbers] REF ID [numbers]<\/li>\n<li>Time to Sign: 2025 SuperAnnuation Enrollment Agreement (January 2025).<\/li>\n<li>New Voicemail [recipient\u2019s email username]<\/li>\n<li>You have a new voicemail<\/li>\n<li>New Voicemail from [email username]<\/li>\n<li>New Vendor PO#[numbers] (Submission Ref: [random characters], Dated: [date]\/Jan\/2025)<\/li>\n<li>TT-[numbers] Approved<\/li>\n<li>XeroxVersaLink_[random characters]-2025-01-[date]_Contract_[random characters].pdf<\/li>\n<li>Health and Bonus Benefits Enrollment -Ref:-br#[numbers], Dated : [date]\/Jan\/2025<\/li>\n<li>Payment Advice &#8211; Ref: \/ RFQ Priority Payment \/ Customer Ref:<\/li>\n<li>KPI Review and Commission Release for [email username] (Ref: [numbers], Dated [day of week], [date]).<\/li>\n<li>Important: Save or print your finalized document Review Document completion\u2014kindly confirm or ammend #BookingRef-[random characters]<\/li>\n<li>Payment Confirmation &#8211; SWIFT [random characters].pdf<\/li>\n<li>Your RemittanceReciept Fax-[date]\/2025 [time] Contact \u2013 [email address]<\/li>\n<li>eSignature Required: Capital Funding Docs Via e-Docs Ref-[random characters]<\/li>\n<li>Action: Scan Data: Distribution Agreement for your review and signature. Message ID: #[random characters]<\/li>\n<li>Attn: Audio Recording REC#[numbers].wav Transcript [date] January 2025 $[random characters]<\/li>\n<\/ul>\n<p>Many well-known brands and online services are being abused by these attacks, including:<\/p>\n<ul>\n<li>DocuSign<\/li>\n<li>Microsoft SharePoint<\/li>\n<li>Dropbox<\/li>\n<li>Google Voice<\/li>\n<li>RingCentral<\/li>\n<\/ul>\n<p>The body content of these messages is similarly rudimentary, though it may contain the email username (the part of the address that appears before the @ sign) of the recipient\/target in the body of the message.<\/p>\n<figure id=\"attachment_959591\" aria-describedby=\"caption-attachment-959591\" style=\"width: 616px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959591\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image5.png\" alt=\"A malicious SVG attached to a fake &quot;fax notification&quot; email\" width=\"616\" height=\"288\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image5.png 616w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image5.png?resize=300,140 300w\" sizes=\"auto, (max-width: 616px) 100vw, 616px\" \/><\/a><figcaption id=\"caption-attachment-959591\" class=\"wp-caption-text\">A malicious SVG attached to a fake &#8220;fax notification&#8221; email<\/figcaption><\/figure>\n<h3>How the attack works<\/h3>\n<p>When the target receives an email with an SVG attachment and opens it, unless they have another program they already use to work with SVG files, the file opens in the default browser.<\/p>\n<p>The simplest of these malicious SVG files contain one or a few lines of hyperlinked text that prepend the email username to the phrase \u201cClick To Open\u201d or \u201cClick the link below to listen to the voicemail.\u201d<\/p>\n<figure id=\"attachment_959592\" aria-describedby=\"caption-attachment-959592\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959592\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image6.png\" alt=\"A simplistic SVG that purports to be a voicemail notification\" width=\"640\" height=\"411\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image6.png 743w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image6.png?resize=300,193 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959592\" class=\"wp-caption-text\">A simplistic SVG that purports to be a voicemail notification<\/figcaption><\/figure>\n<p>The link leads to a phishing page behind a CloudFlare captcha gate. Check the box to prove you\u2019re a human, and you\u2019re redirected to a page operated by the phishing gang that frames a real Office365 login dialog within itself, so it can validate the email and password at the same time as stealing it.<\/p>\n<figure id=\"attachment_959593\" aria-describedby=\"caption-attachment-959593\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959593\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image7.png\" alt=\"A CAPTCHA protects a phishing site\" width=\"640\" height=\"256\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image7.png 714w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image7.png?resize=300,120 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959593\" class=\"wp-caption-text\">A CAPTCHA protects a phishing site<\/figcaption><\/figure>\n<figure id=\"attachment_959594\" aria-describedby=\"caption-attachment-959594\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959594\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image8.png\" alt=\"An alternative CAPTCHA page gating a phishing site\" width=\"640\" height=\"214\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image8.png 934w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image8.png?resize=300,100 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image8.png?resize=768,257 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959594\" class=\"wp-caption-text\">An alternative CAPTCHA page gating a phishing site<\/figcaption><\/figure>\n<p>However, we\u2019ve found more elaborately constructed files as well. One version embeds a link to a remote image inside of the \u201csvg.\u201d The images are hosted on a different, attacker-controlled domain.<\/p>\n<figure id=\"attachment_959595\" aria-describedby=\"caption-attachment-959595\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959595\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image9.png\" alt=\"The SVG contains a live link that points to a raster image resembling a SharePoint notification hosted elsewhere\" width=\"640\" height=\"620\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image9.png 655w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image9.png?resize=300,291 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959595\" class=\"wp-caption-text\">The SVG contains a live link that points to a raster image resembling a SharePoint notification hosted elsewhere<\/figcaption><\/figure>\n<p>There are multiple different versions of the embedded image that are designed to look like DocuSign or SharePoint pages. Clicking anywhere on the image loads the CAPTCHA-gated phishing page. Another version loads the image from a Google Doc.<\/p>\n<figure id=\"attachment_959596\" aria-describedby=\"caption-attachment-959596\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959596\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image10.png\" alt=\"The &quot;LegalSkillsTraining&quot; website hosts nothing but images leveraged in SVG phishing campaigns\" width=\"640\" height=\"531\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image10.png 867w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image10.png?resize=300,249 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image10.png?resize=768,638 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959596\" class=\"wp-caption-text\">The &#8220;LegalSkillsTraining&#8221; website hosts nothing but images leveraged in SVG phishing campaigns<\/figcaption><\/figure>\n<p>The most convoluted of these malicious SVGs contained whole blocks of text that had been lifted, seemingly at random, from Wikipedia articles. The text was embedded in the source of the SVG but commented out, so it does not appear on screen.<\/p>\n<figure id=\"attachment_959597\" aria-describedby=\"caption-attachment-959597\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959597\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png\" alt=\"A Wikipedia entry fills space in this malicious SVG that also includes Javascript\" width=\"640\" height=\"332\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png 1274w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png?resize=300,156 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png?resize=768,398 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image11.png?resize=1024,531 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959597\" class=\"wp-caption-text\">A Wikipedia entry fills space in this malicious SVG that also includes JavaScript<\/figcaption><\/figure>\n<p>Also present within another SVG was an elaborate JavaScript that automatically loads the phishing page after a short delay, even if the user doesn\u2019t click any of the hotlinked content.<\/p>\n<figure id=\"attachment_959598\" aria-describedby=\"caption-attachment-959598\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959598\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image12.png\" alt=\"The &quot;RaccoonClient&quot; version of the SVG automatically loads the phishing page after a delay\" width=\"640\" height=\"447\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image12.png 798w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image12.png?resize=300,209 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image12.png?resize=768,536 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959598\" class=\"wp-caption-text\">The &#8220;RaccoonClient&#8221; version of the SVG automatically loads the phishing page after a delay<\/figcaption><\/figure>\n<p>The phishing pages were all hosted on attacker-controlled domains. As previously mentioned, nearly all of them were gated with a CloudFlare CAPTCHA to prevent automated visits. The sites prefetch the content of the Office365 login dialog from<strong> login.live.com<\/strong> and present the target with all the expected animations familiar to an O365 user.<\/p>\n<figure id=\"attachment_959599\" aria-describedby=\"caption-attachment-959599\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959599\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image13.png\" alt=\"The source of the phishing page shows it loading the Microsoft login content inside a frame within the page\" width=\"640\" height=\"327\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image13.png 912w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image13.png?resize=300,153 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image13.png?resize=768,392 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959599\" class=\"wp-caption-text\">The source of the phishing page shows it loading the Microsoft login content inside a frame within the page that captures keystrokes<\/figcaption><\/figure>\n<p>In some cases, the script pre-populated the login dialog with the target\u2019s email address, which had been passed in the query string from the link embedded in the SVG file. An \u201cEventListener\u201d JavaScript in the iFrame captures all typed input as the user enters it into the form.<\/p>\n<p>In tests we ran against live sites, most of the sites immediately captured the text input and exfiltrated it directly to the domain hosting the iFrame the login dialog appears in. In a few cases, we discovered that the credentials were transmitted to multiple sites simultaneously.<\/p>\n<figure id=\"attachment_959600\" aria-describedby=\"caption-attachment-959600\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959600\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png\" alt=\"One of the external sites that received exfiltrated data, &quot;VirtualPorno,&quot; which had nothing of the sort but did have open directories\" width=\"640\" height=\"162\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png 1119w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png?resize=300,76 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png?resize=768,195 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image14.png?resize=1024,260 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959600\" class=\"wp-caption-text\">One of the external sites that received exfiltrated data, &#8220;VirtualPorno,&#8221; which had nothing of the sort, but did have open directories that contained the phishing scripts<\/figcaption><\/figure>\n<p>One session even passed the credentials to a Telegram bot using the messaging service\u2019s API.<\/p>\n<figure id=\"attachment_959601\" aria-describedby=\"caption-attachment-959601\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959601\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png\" alt=\"An SVG phishing page exfiltrates data to a Telegram bot\" width=\"640\" height=\"508\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png 1302w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png?resize=300,238 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png?resize=768,610 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image15.png?resize=1024,813 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959601\" class=\"wp-caption-text\">An SVG phishing page exfiltrates data to a Telegram bot<\/figcaption><\/figure>\n<p>Over the course of a week, we were able to observe the phishing pages growing more sophisticated. Very sparsely designed pages began to get cleaner, such as this \u201cvoicemail\u201d page.<\/p>\n<figure id=\"attachment_959602\" aria-describedby=\"caption-attachment-959602\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959602\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image16.png\" alt=\"A &quot;voicemail&quot; download link prompts for a password. The target's email address was prefilled.\" width=\"640\" height=\"452\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image16.png 801w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image16.png?resize=300,212 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image16.png?resize=768,543 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959602\" class=\"wp-caption-text\">A &#8220;voicemail&#8221; download link prompts for a password. The target&#8217;s email address was prefilled.<\/figcaption><\/figure>\n<p>We also saw brands like Google Voice carefully mimicked in some phishing pages.<\/p>\n<figure id=\"attachment_959603\" aria-describedby=\"caption-attachment-959603\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959603\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png\" alt=\"A fake Google Voice login also had the target's email address as well as the name of their employer's organization embedded in the page.\" width=\"640\" height=\"351\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png 1150w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png?resize=300,164 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png?resize=768,421 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image17.png?resize=1024,561 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959603\" class=\"wp-caption-text\">A fake Google Voice login also had the target&#8217;s email address as well as the name of their employer&#8217;s organization embedded in the page.<\/figcaption><\/figure>\n<p>We eventually found versions that targeted different languages, based on the top-level domain of the recipient. For example, both the email addressed to a target at a Japanese academic institution, and its embedded SVG, was crafted in Japanese. This led to a very realistic looking simulacrum of a Dropbox login screen, also localized to Japanese.<\/p>\n<figure id=\"attachment_959604\" aria-describedby=\"caption-attachment-959604\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959604\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image18.png\" alt=\"A fake Dropbox login in Japanese prompts the target to download a voicemail message\" width=\"640\" height=\"456\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image18.png 965w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image18.png?resize=300,214 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image18.png?resize=768,548 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959604\" class=\"wp-caption-text\">A fake Dropbox login in Japanese prompts the target to download a voicemail message<\/figcaption><\/figure>\n<p>One of the SVG files appeared to try to leverage a networked drive on the target\u2019s own network. It contained a Microsoft network path instead of a URL.<\/p>\n<figure id=\"attachment_959605\" aria-describedby=\"caption-attachment-959605\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959605\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png\" alt=\" The &quot;shared file&quot; spam contains an SVG that uses a network path, presumably accessible to the target's network\" width=\"640\" height=\"340\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png 1277w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png?resize=300,159 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png?resize=768,408 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image19.png?resize=1024,544 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959605\" class=\"wp-caption-text\">The &#8220;shared file&#8221; spam contains an SVG that uses a network path, presumably accessible to the target&#8217;s network<\/figcaption><\/figure>\n<p>The \u201cShared File\u201d link triggered a download of an HTML file, which when opened produced a page that looks like it has a blurred PDF document in the background.<\/p>\n<figure id=\"attachment_959606\" aria-describedby=\"caption-attachment-959606\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959606\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image20.png\" alt=\"The local HTML file prompts the user to click the Open button\" width=\"640\" height=\"602\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image20.png 733w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image20.png?resize=300,282 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959606\" class=\"wp-caption-text\">The local HTML file prompts the user to click the Open button<\/figcaption><\/figure>\n<p>But when tested, the browser threw an error message that indicated the site was trying to open a local network path in Windows Explorer.<\/p>\n<figure id=\"attachment_959607\" aria-describedby=\"caption-attachment-959607\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959607\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image21.png\" alt=\"The error message indicates that instead of a webpage it was trying to open a local network path\" width=\"640\" height=\"502\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image21.png 683w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image21.png?resize=300,235 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959607\" class=\"wp-caption-text\">The error message indicates that instead of a webpage it was trying to open a local network path<\/figcaption><\/figure>\n<p>The page source seems to want to open a network path under \u201ctrycloudflare.com\u201d that passes an embedded, hardcoded username and password unsuccessfully.<\/p>\n<figure id=\"attachment_959608\" aria-describedby=\"caption-attachment-959608\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959608\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png\" alt=\"A network path that contained a hardcoded username and password\" width=\"640\" height=\"49\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png 1095w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png?resize=300,23 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png?resize=768,58 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image22.png?resize=1024,78 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959608\" class=\"wp-caption-text\">A network path that contained a hardcoded username and password<\/figcaption><\/figure>\n<p>Finally, another of the SVG files we discovered appeared to contain a large amount of data encoded as base64. When we decoded the data, we found that it was a Zip archive, containing two files.<\/p>\n<figure id=\"attachment_959609\" aria-describedby=\"caption-attachment-959609\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image23.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959609\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image23.png\" alt=\"The SVG with a base64 data blob inside\" width=\"640\" height=\"254\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image23.png 746w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image23.png?resize=300,119 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959609\" class=\"wp-caption-text\">The SVG with a base64 data blob inside<\/figcaption><\/figure>\n<p>Of the two files compressed into the Zip file, one was password-protected, the other was not. The password-protected file is a Windows malware executable. The unprotected file was a plaintext document that, oddly, contained the password for the other file in the archive.<\/p>\n<figure id=\"attachment_959610\" aria-describedby=\"caption-attachment-959610\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image24.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959610\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image24.png\" alt=\"The zip file contained a password-protected executable and an unprotected text file that contained the password for the other file\" width=\"640\" height=\"114\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image24.png 664w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image24.png?resize=300,53 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959610\" class=\"wp-caption-text\">The zip file contained a password-protected executable and an unprotected text file that contained the password for the other file<\/figcaption><\/figure>\n<p>It\u2019s the first time I\u2019d seen a password for a password-protected Zip embedded into the Zip itself. But it did, in fact, work.<\/p>\n<figure id=\"attachment_959611\" aria-describedby=\"caption-attachment-959611\" style=\"width: 525px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image25.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959611\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image25.png\" alt=\"The password in the text file compressed with the malware\" width=\"525\" height=\"69\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image25.png 525w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image25.png?resize=300,39 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/a><figcaption id=\"caption-attachment-959611\" class=\"wp-caption-text\">The password in the text file compressed with the malware executable<\/figcaption><\/figure>\n<p>The file, uncompressed, is <a href=\"https:\/\/www.virustotal.com\/gui\/file\/986924015fd14048064f21fc138296b4a36f34688024edbfb28f1036a6ca4ada\/detection\">a malware that we currently detect<\/a> as Troj\/AutoIt-DHB. It is an AutoIt script that sets up and installs a keystroke logger called Nymeria, all by the target double-clicking what is ostensibly an image file.<\/p>\n<h3>Serious victim grief<\/h3>\n<p>Malicious SVG files appear designed to evade detection by conventional endpoint or mail protection tools. However, work by analysts as a result of this research led to the development of a detection signature for the various kinds of weaponized files we\u2019ve observed. That detection, Cxmail\/EmSVG-C, is now live in Sophos Central Email.<\/p>\n<p>For regular folks, there are a couple of things that can be done to inoculate your computer against this threat. First, you can find a real SVG graphic file, download it, and then instruct Windows to always open it in Notepad (or some other non-browser program) instead of the default browser.<\/p>\n<p>To do this, you just download <a href=\"https:\/\/dev.w3.org\/SVG\/tools\/svgweb\/samples\/svg-files\/bozo.svg\">a real SVG graphic, like this one<\/a> to your desktop. Right-click the file, and choose \u201cOpen with -&gt; Choose another app\u201d \u2013 pick something that isn\u2019t a browser (like Notepad) and fill in the checkbox that reads \u201cAlways use this app to open .svg files.\u201d<\/p>\n<figure id=\"attachment_959612\" aria-describedby=\"caption-attachment-959612\" style=\"width: 601px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image26.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959612\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image26.png\" alt=\"First choose another app...\" width=\"601\" height=\"279\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image26.png 601w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image26.png?resize=300,139 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/a><figcaption id=\"caption-attachment-959612\" class=\"wp-caption-text\">First choose another app&#8230;<\/figcaption><\/figure>\n<figure id=\"attachment_959613\" aria-describedby=\"caption-attachment-959613\" style=\"width: 391px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image27.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959613\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image27.png\" alt=\"...then pick something benign that should open it instead of the browser\" width=\"391\" height=\"510\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image27.png 391w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image27.png?resize=230,300 230w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/a><figcaption id=\"caption-attachment-959613\" class=\"wp-caption-text\">&#8230;then pick something benign that should open it instead of the browser, and check &#8220;Always use this app&#8221;<\/figcaption><\/figure>\n<p>Even if you accidentally click a malicious SVG in the future, it\u2019ll only open in Notepad, throwing another roadblock in front of (potentially) being phished. (If, at some point, you find you need to work with real SVG files, follow the same steps again, and choose the graphics application you plan to use.)<\/p>\n<p>The phishing pages that loaded in this attack were also quite obviously not hosted on Microsoft\u2019s normal websites. Simply looking at the URL in the browser address bar should be enough to reveal you\u2019re not visiting SharePoint or DocuSign, when you\u2019re loading a page with an .ru top-level domain.<\/p>\n<figure id=\"attachment_959614\" aria-describedby=\"caption-attachment-959614\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image28.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959614\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image28.png\" alt=\"Your first clue is the .ru\" width=\"640\" height=\"531\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image28.png 657w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image28.png?resize=300,249 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-959614\" class=\"wp-caption-text\">Your first clue is the .ru<\/figcaption><\/figure>\n<p>There were other clues as well, such as the fact that the invoices or other messages appeared to come from email accounts that had never emailed the targets before, and were light on details like contact information (or even any message at all in the body, in some cases).<\/p>\n<figure id=\"attachment_959615\" aria-describedby=\"caption-attachment-959615\" style=\"width: 613px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image29.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-959615\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image29.png\" alt=\" I hope your lawyer writes more than absolutely nothing when they send you a contract to sign\" width=\"613\" height=\"250\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image29.png 613w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image29.png?resize=300,122 300w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><\/a><figcaption id=\"caption-attachment-959615\" class=\"wp-caption-text\">I hope your lawyer writes more than absolutely nothing when they send you a contract to sign<\/figcaption><\/figure>\n<p>So keeping a sharp, critical eye on messages that seem fishy might be the best phishing prevention<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Indicators of compromise for this threat have been <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/20250205_SVGspam.csv\" target=\"_blank\" rel=\"noopener\">posted to our Github repository<\/a>. Detections have been added for the spam attachment subtype (CXmail\/EmSVG-C) in Central Email, SFOS, and some endpoint products, as well as signature-based detection for the malicious SVG attachments (Troj\/XMLPh-A, Troj\/XMLPh-E, Troj\/XMLPh-F, Troj\/XMLDrp-AJ, Troj\/XML-AV, and Troj\/XMLDl-K).<\/p>\n<h3>\u00a0Acknowledgments<\/h3>\n<p>Sophos X-Ops thanks Brett Cove and Fan Ho of the mail security team, and Krupa Gajjar, Rutvik Panchal, Khushi Punia, Gyan Ranjan, Purva Shah, Kafil Ahmed Shaikh, Devang Sharma, Simran Sharma, Aaditya Trivedi, and Amey Vijaywargiya of SophosLabs.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2025\/02\/05\/svg-phishing\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/02\/202502_svgphish_image1.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Andrew Brandt| Date: Wed, 05 Feb 2025 17:01:03 +0000<\/strong><\/p>\n<p>The SVG file format can harbor malicious HTML, scripts, and malware<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[32391,129,3924,32392,10518,16771],"class_list":["post-25753","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-svg","tag-featured","tag-phishing","tag-scalable-vector-graphics","tag-spam","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25753"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25753\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25753"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}