Judicial Notification Phish Targets Colombian Users – .SVG Attachment Deploys Info-stealer Malware
A sophisticated phishing campaign targets Colombian users by impersonating the Attorney General's Office with judicial notification lures. The attack uses a multi-stage infection chain starting with a malicious . SVG file attachment that triggers HTA, VBS, and PowerShell scripts, ultimately injecting the AsyncRAT malware into MSBuild. exe. AsyncRAT establishes command and control (C2) communications, steals data, and can dynamically load plugins. The campaign employs anti-virtual machine (VM) techniques, persistence mechanisms, and heavy obfuscation to evade detection. Although primarily focused on Colombia, the advanced tactics and malware capabilities pose risks to any organization exposed to similar phishing vectors. The threat demonstrates extensive use of MITRE ATT&CK techniques, including execution, persistence, defense evasion, credential access, and command and control. No known exploits or CVEs are associated, and the severity is assessed as medium based on current information.
AI Analysis
Technical Summary
This threat involves a targeted phishing campaign aimed at Colombian users, leveraging a judicial notification theme to increase credibility. The initial infection vector is a malicious .SVG file attachment embedded in phishing emails, which exploits the ability of SVG files to execute scripts. Upon opening, the SVG triggers a chain of scripts including HTA (HTML Application), VBS (Visual Basic Script), and PowerShell, which work together to download and execute the AsyncRAT malware. AsyncRAT is a remote access trojan capable of stealing sensitive information, maintaining persistence by injecting itself into MSBuild.exe (a legitimate Microsoft build tool), and establishing encrypted C2 channels for remote control. The malware also supports dynamic plugin loading, enabling attackers to extend functionality post-infection. The campaign uses anti-VM and anti-debugging techniques to avoid sandbox detection and employs obfuscation to hinder analysis. It impersonates the Colombian Attorney General's Office, using localized and institutional details to increase the likelihood of user interaction. The attack chain covers multiple MITRE ATT&CK techniques such as T1566.001 (phishing), T1053.005 (scheduled task), T1543 (service creation), T1055 (process injection), T1071 (C2 communication), and T1547.001 (registry run keys), among others. Although no CVEs or known exploits are linked, the campaign's sophistication and multi-stage execution make it a notable threat. The campaign is currently focused on Colombia but the techniques and malware could be adapted for other regions.
Potential Impact
For European organizations, the direct impact is currently limited given the campaign's geographic targeting of Colombia. However, the use of highly evasive techniques and a powerful RAT like AsyncRAT poses a significant risk if similar phishing lures or malware variants are adapted for European targets. Successful infections could lead to data theft, espionage, credential compromise, and long-term persistence within networks. The injection into MSBuild.exe allows the malware to blend with legitimate processes, complicating detection and remediation. If attackers localize the phishing lure to European judicial or governmental institutions, the risk of successful compromise increases. The campaign's ability to dynamically load plugins means attackers can tailor payloads to specific targets, potentially impacting critical infrastructure, government agencies, or enterprises handling sensitive data. The use of anti-VM and obfuscation techniques further complicates detection by traditional security tools, increasing dwell time and potential damage. European organizations with weak email filtering, insufficient user awareness training, or inadequate endpoint detection capabilities are most at risk.
Mitigation Recommendations
European organizations should implement advanced email filtering solutions capable of detecting and blocking malicious attachments, including less common file types like .SVG and .HTA. Deploy endpoint detection and response (EDR) tools with behavioral analytics to identify suspicious script execution, process injection, and unusual MSBuild.exe activity. Enforce strict application whitelisting and restrict execution of scripting engines (PowerShell, VBS) to only authorized users and contexts. Conduct targeted phishing awareness training emphasizing the risks of opening attachments from unknown or unexpected sources, especially those impersonating judicial or governmental bodies. Regularly audit scheduled tasks, services, and registry run keys for unauthorized persistence mechanisms. Implement network segmentation and monitor outbound traffic for anomalous C2 communications, particularly those matching AsyncRAT patterns. Use threat intelligence feeds to update detection signatures based on known hashes and indicators of compromise (IOCs) associated with this campaign. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential infections.
Affected Countries
Colombia, Spain, Germany, France, Italy, United Kingdom
Indicators of Compromise
- hash: 5fad0c5b6e5a758059c5a4e633424555
- hash: 6da792b17c4bba72ca995061e040f984
- hash: b1ed63ee45ec48b324bf126446fdc888
Judicial Notification Phish Targets Colombian Users – .SVG Attachment Deploys Info-stealer Malware
Description
A sophisticated phishing campaign targets Colombian users by impersonating the Attorney General's Office with judicial notification lures. The attack uses a multi-stage infection chain starting with a malicious . SVG file attachment that triggers HTA, VBS, and PowerShell scripts, ultimately injecting the AsyncRAT malware into MSBuild. exe. AsyncRAT establishes command and control (C2) communications, steals data, and can dynamically load plugins. The campaign employs anti-virtual machine (VM) techniques, persistence mechanisms, and heavy obfuscation to evade detection. Although primarily focused on Colombia, the advanced tactics and malware capabilities pose risks to any organization exposed to similar phishing vectors. The threat demonstrates extensive use of MITRE ATT&CK techniques, including execution, persistence, defense evasion, credential access, and command and control. No known exploits or CVEs are associated, and the severity is assessed as medium based on current information.
AI-Powered Analysis
Technical Analysis
This threat involves a targeted phishing campaign aimed at Colombian users, leveraging a judicial notification theme to increase credibility. The initial infection vector is a malicious .SVG file attachment embedded in phishing emails, which exploits the ability of SVG files to execute scripts. Upon opening, the SVG triggers a chain of scripts including HTA (HTML Application), VBS (Visual Basic Script), and PowerShell, which work together to download and execute the AsyncRAT malware. AsyncRAT is a remote access trojan capable of stealing sensitive information, maintaining persistence by injecting itself into MSBuild.exe (a legitimate Microsoft build tool), and establishing encrypted C2 channels for remote control. The malware also supports dynamic plugin loading, enabling attackers to extend functionality post-infection. The campaign uses anti-VM and anti-debugging techniques to avoid sandbox detection and employs obfuscation to hinder analysis. It impersonates the Colombian Attorney General's Office, using localized and institutional details to increase the likelihood of user interaction. The attack chain covers multiple MITRE ATT&CK techniques such as T1566.001 (phishing), T1053.005 (scheduled task), T1543 (service creation), T1055 (process injection), T1071 (C2 communication), and T1547.001 (registry run keys), among others. Although no CVEs or known exploits are linked, the campaign's sophistication and multi-stage execution make it a notable threat. The campaign is currently focused on Colombia but the techniques and malware could be adapted for other regions.
Potential Impact
For European organizations, the direct impact is currently limited given the campaign's geographic targeting of Colombia. However, the use of highly evasive techniques and a powerful RAT like AsyncRAT poses a significant risk if similar phishing lures or malware variants are adapted for European targets. Successful infections could lead to data theft, espionage, credential compromise, and long-term persistence within networks. The injection into MSBuild.exe allows the malware to blend with legitimate processes, complicating detection and remediation. If attackers localize the phishing lure to European judicial or governmental institutions, the risk of successful compromise increases. The campaign's ability to dynamically load plugins means attackers can tailor payloads to specific targets, potentially impacting critical infrastructure, government agencies, or enterprises handling sensitive data. The use of anti-VM and obfuscation techniques further complicates detection by traditional security tools, increasing dwell time and potential damage. European organizations with weak email filtering, insufficient user awareness training, or inadequate endpoint detection capabilities are most at risk.
Mitigation Recommendations
European organizations should implement advanced email filtering solutions capable of detecting and blocking malicious attachments, including less common file types like .SVG and .HTA. Deploy endpoint detection and response (EDR) tools with behavioral analytics to identify suspicious script execution, process injection, and unusual MSBuild.exe activity. Enforce strict application whitelisting and restrict execution of scripting engines (PowerShell, VBS) to only authorized users and contexts. Conduct targeted phishing awareness training emphasizing the risks of opening attachments from unknown or unexpected sources, especially those impersonating judicial or governmental bodies. Regularly audit scheduled tasks, services, and registry run keys for unauthorized persistence mechanisms. Implement network segmentation and monitor outbound traffic for anomalous C2 communications, particularly those matching AsyncRAT patterns. Use threat intelligence feeds to update detection signatures based on known hashes and indicators of compromise (IOCs) associated with this campaign. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential infections.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/judicial-notification-phish-colombia-svg-asyncrat/"]
- Adversary
- null
- Pulse Id
- 68ed4c95892f0090f1b70ec4
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash5fad0c5b6e5a758059c5a4e633424555 | — | |
hash6da792b17c4bba72ca995061e040f984 | — | |
hashb1ed63ee45ec48b324bf126446fdc888 | — |
Threat ID: 68ed566406a2a330d32311e5
Added to database: 10/13/2025, 7:43:32 PM
Last enriched: 10/13/2025, 7:43:53 PM
Last updated: 10/15/2025, 4:19:15 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-10-14
MediumBombShell: UEFI shell vulnerabilities allow attackers to bypass Secure Boot on Framework Devices
MediumAstaroth Trojan Targets Windows, Uses GitHub Images to Stay Active After Takedowns
MediumBanking Trojan Abusing GitHub for Resilience
MediumWhen the monster bytes: tracking TA585 and its arsenal
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.