Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Judicial Notification Phish Targets Colombian Users – .SVG Attachment Deploys Info-stealer Malware

0
Medium
Published: Mon Oct 13 2025 (10/13/2025, 19:01:41 UTC)
Source: AlienVault OTX General

Description

A sophisticated phishing campaign targets Colombian users by impersonating the Attorney General's Office with judicial notification lures. The attack uses a multi-stage infection chain starting with a malicious . SVG file attachment that triggers HTA, VBS, and PowerShell scripts, ultimately injecting the AsyncRAT malware into MSBuild. exe. AsyncRAT establishes command and control (C2) communications, steals data, and can dynamically load plugins. The campaign employs anti-virtual machine (VM) techniques, persistence mechanisms, and heavy obfuscation to evade detection. Although primarily focused on Colombia, the advanced tactics and malware capabilities pose risks to any organization exposed to similar phishing vectors. The threat demonstrates extensive use of MITRE ATT&CK techniques, including execution, persistence, defense evasion, credential access, and command and control. No known exploits or CVEs are associated, and the severity is assessed as medium based on current information.

AI-Powered Analysis

AILast updated: 10/13/2025, 19:43:53 UTC

Technical Analysis

This threat involves a targeted phishing campaign aimed at Colombian users, leveraging a judicial notification theme to increase credibility. The initial infection vector is a malicious .SVG file attachment embedded in phishing emails, which exploits the ability of SVG files to execute scripts. Upon opening, the SVG triggers a chain of scripts including HTA (HTML Application), VBS (Visual Basic Script), and PowerShell, which work together to download and execute the AsyncRAT malware. AsyncRAT is a remote access trojan capable of stealing sensitive information, maintaining persistence by injecting itself into MSBuild.exe (a legitimate Microsoft build tool), and establishing encrypted C2 channels for remote control. The malware also supports dynamic plugin loading, enabling attackers to extend functionality post-infection. The campaign uses anti-VM and anti-debugging techniques to avoid sandbox detection and employs obfuscation to hinder analysis. It impersonates the Colombian Attorney General's Office, using localized and institutional details to increase the likelihood of user interaction. The attack chain covers multiple MITRE ATT&CK techniques such as T1566.001 (phishing), T1053.005 (scheduled task), T1543 (service creation), T1055 (process injection), T1071 (C2 communication), and T1547.001 (registry run keys), among others. Although no CVEs or known exploits are linked, the campaign's sophistication and multi-stage execution make it a notable threat. The campaign is currently focused on Colombia but the techniques and malware could be adapted for other regions.

Potential Impact

For European organizations, the direct impact is currently limited given the campaign's geographic targeting of Colombia. However, the use of highly evasive techniques and a powerful RAT like AsyncRAT poses a significant risk if similar phishing lures or malware variants are adapted for European targets. Successful infections could lead to data theft, espionage, credential compromise, and long-term persistence within networks. The injection into MSBuild.exe allows the malware to blend with legitimate processes, complicating detection and remediation. If attackers localize the phishing lure to European judicial or governmental institutions, the risk of successful compromise increases. The campaign's ability to dynamically load plugins means attackers can tailor payloads to specific targets, potentially impacting critical infrastructure, government agencies, or enterprises handling sensitive data. The use of anti-VM and obfuscation techniques further complicates detection by traditional security tools, increasing dwell time and potential damage. European organizations with weak email filtering, insufficient user awareness training, or inadequate endpoint detection capabilities are most at risk.

Mitigation Recommendations

European organizations should implement advanced email filtering solutions capable of detecting and blocking malicious attachments, including less common file types like .SVG and .HTA. Deploy endpoint detection and response (EDR) tools with behavioral analytics to identify suspicious script execution, process injection, and unusual MSBuild.exe activity. Enforce strict application whitelisting and restrict execution of scripting engines (PowerShell, VBS) to only authorized users and contexts. Conduct targeted phishing awareness training emphasizing the risks of opening attachments from unknown or unexpected sources, especially those impersonating judicial or governmental bodies. Regularly audit scheduled tasks, services, and registry run keys for unauthorized persistence mechanisms. Implement network segmentation and monitor outbound traffic for anomalous C2 communications, particularly those matching AsyncRAT patterns. Use threat intelligence feeds to update detection signatures based on known hashes and indicators of compromise (IOCs) associated with this campaign. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential infections.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/judicial-notification-phish-colombia-svg-asyncrat/"]
Adversary
null
Pulse Id
68ed4c95892f0090f1b70ec4
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5fad0c5b6e5a758059c5a4e633424555
hash6da792b17c4bba72ca995061e040f984
hashb1ed63ee45ec48b324bf126446fdc888

Threat ID: 68ed566406a2a330d32311e5

Added to database: 10/13/2025, 7:43:32 PM

Last enriched: 10/13/2025, 7:43:53 PM

Last updated: 10/15/2025, 4:19:15 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats