Throughout 2025, IBM X-Force has been tracking a phishing campaign targeting financial institutions worldwide. This operation leveraged weaponized Scalable Vector Graphics (SVG) files embedded with JavaScript to initiate multi-stage malware infections. While the use of SVGs in phishing is not new, recent reporting indicates a notable rise in this tactic, signaling a broader shift in the threat landscape.
This campaign goes beyond traditional credential harvesting—employing advanced loaders, modular Remote Access Trojans (RATs), and trusted infrastructure like Amazon S3 and Telegram for command-and-control (C2). The activity showcases how attackers are evolving phishing techniques into full-scale initial access operations.
X-Force analysis uncovered a global phishing campaign leveraging SVG files as the initial attack vector. These files, disguised as financial transaction documents, contain embedded JavaScript that writes a ZIP archive to the system. Within the archive, a JavaScript file initiates a malware infection chain—ultimately deploying RATs such as Blue Banana, SambaSpy and SessionBot. These payloads are designed for credential theft, session hijacking, surveillance, and data exfiltration, posing significant risks to targeted organizations.
The malware communicates via Amazon S3 and the Telegram Bot API, blending into legitimate traffic and complicating detection efforts. By using a file format rarely scrutinized in phishing filters, the campaign bypasses traditional defenses with ease.
This approach reflects an emerging pattern across recent OSINT reporting, technical blogs and industry analysis, highlighting how SVGs are increasingly abused to embed malware loaders and redirect victims to malicious content.
Notably, the campaign’s use of SWIFT-themed lures—referencing the Society for Worldwide Interbank Financial Telecommunication (SWIFT), the global network used by financial institutions for secure messaging—suggests a deliberate focus on victims in the finance sector.
This activity illustrates a broader trend in phishing tradecraft: attackers are moving beyond credential theft into delivering advanced malware using creative, low-profile vectors. Defenders should adapt detection logic and employee training accordingly—recognizing that even innocuous file types like SVGs can now act as malware delivery platforms.
Unlike typical phishing campaigns that aim for credential theft through spoofed login pages, this campaign transitioned from lure to loader, turning what appeared to be an image file into the starting point for a multi-stage malware infection chain.
The campaign’s initial access phase involved phishing emails impersonating SWIFT Global Services, urging recipients to review time-sensitive payment or transfer confirmations. The attached file, presented as a legitimate document, was a weaponized SVG containing JavaScript.
Once rendered, the victim is enticed to download a report which appears to be a PDF file; however, selecting either PDF will trigger the JavaScript to save a ZIP archive file to the system.
Once the archive is extracted and unzipped, victims find a file named Swift Transaction Report.js that contains obfuscated JavaScript. The script was designed to evade detection using Unicode escape encoding and string concatenation techniques. Executing the script will trigger the download of a heavily obfuscated Java Archive (JAR) file, such as Swift Confirmation Copy.jar and Tranzacție+în+USD-pdf.jar. These acted as first-stage downloaders, leveraging obfuscators like Branchlock and Zelix KlassMaster to evade static and behavioral analysis.
IBM X-Force analyzed some SVG samples that dropped the JAR downloader instead of the ZIP file containing the JavaScript, bypassing a stage of the infection chain.
If the target system had the Java Runtime Environment (JRE) installed, the loader executed and initiated a series of environmental checks to detect sandboxing or analysis tools. These included inspecting system processes, entropy and virtualization indicators. Only after validating a real-user environment did the malware attempt to retrieve second-stage payloads.
To do so, it reached out to attacker-controlled Amazon S3 buckets, blending malicious downloads into otherwise trusted cloud service traffic. Some variants embedded the encrypted payloads inside benign-looking decoy files to further reduce the likelihood of detection during transfer.
Once evasion checks were passed, the loader established outbound connections to attacker-controlled Amazon S3 buckets to retrieve encrypted second-stage payloads. The use of cloud-based infrastructure added complexity to detection efforts, as traffic to services like amazonaws.com often blends in with normal enterprise activity.
Payloads were observed being downloaded from:
Upon decryption and unpacking, the malware wrote files to key persistence locations, including:
In addition to file-based persistence, some variants registered scheduled tasks or modified registry autorun keys to maintain access across system reboots. Several samples also delayed execution or gated functionality based on user interaction, further complicating detection through automated sandboxing.
The malware deployed in this campaign exhibits a modular architecture, allowing operators to tailor functionality based on the victim’s environment and objectives. IBM X-Force observed the use of multiple payloads with overlapping surveillance, data theft and persistence capabilities.
Additionally, the campaign employed an Outlook-focused email stealer (email.js) executed via wscript.exe. It scanned for Outlook profiles, extracted inbox contents and staged the data for exfiltration via Telegram-based HTTP POST requests.
To conceal its activity, the malware dropped benign-looking decoy files (e.g., Tranzacție+în+USD-pdf.txt, Swift Confirmation Copy.pdf) that opened upon execution, reinforcing the illusion of legitimacy while malicious processes were executed in the background.
In addition to the Amazon S3 infrastructure previously described, the campaign leveraged Telegram's Bot API for post-compromise command-and-control (C2). This approach enabled threat actors to interact with infected hosts, exfiltrate sensitive data and dynamically issue instructions, all over encrypted messaging infrastructure commonly allowed in enterprise environments.
C2 communications were routed through:
These channels were used for system reconnaissance, extracting Outlook inbox data, and capturing files by malware modules such as SessionBot and the email.js Outlook stealer. The use of Telegram provided anonymity, encryption and operational ease, while also complicating detection through conventional network monitoring.
This dual-channel infrastructure model — combining cloud-based payload hosting with encrypted messaging — reflects a growing trend among financially motivated threat actors to blend malicious traffic into trusted services, prolonging dwell time and increasing the likelihood of success.
X-Force observed evidence of a change from using SWIFT-themed lures to a financial crimes investigation-themed lure beginning at the end of April.
The SVG file using this theme saved a JAR file, Case No.86-2025.jar, to disk. This JAR is the same Java-based downloader used in the SWIFT-themed campaign. Another change included a Java-based RAT, 'STRRAT', which was observed being downloaded along with the SambaSpy and Blue Banana RATs. STRRAT is known for its information-stealing capabilities and flexibility in delivering multiple malicious functions. Despite being relatively lightweight, STRRAT is capable of mimicking ransomware behavior and enabling full remote control over infected systems.
This campaign reflects a broader evolution in phishing tradecraft—moving beyond credential harvesting toward modular malware delivery, long-term access and data exfiltration. By abusing SVG files, a format often overlooked by security filters, threat actors demonstrate a willingness to exploit gaps in conventional detection logic.
The use of SWIFT-themed lures highlights a deliberate focus on financial institutions, leveraging familiarity and trust to enhance click-through rates. Combined with cloud-based infrastructure and encrypted messaging channels like Telegram, the attackers effectively blend malicious activity into normal traffic, reducing the likelihood of early detection.
For defenders, this underscores the need to reassess assumptions about “safe” file types and benign infrastructure. Phishing is no longer just an email problem—it’s an entry point to sophisticated, multi-stage intrusion attacks. Organizations must stay vigilant, extending visibility to nontraditional vectors and continuously adapting detection logic to match the pace of attacker innovation.
Organizations can reduce their exposure to campaigns like this by combining endpoint visibility, secure configuration, and user education.
Indicator | Indicator Type | Context |
141e8bf99ff6b58816951ed8bfd821079d8082be6c02cb36f0fd1ff | SHA256 file hash | Tranzacție+în+USD-pdf.jar (Java downloader) |
ae345b40d165255284bf4c6ab00a871fcb035b552ac0b20b3cfb | SHA256 file hash | Swift Confirmation Copy.jar (Java downloader) |
a4ed118f15c5c943d5964fe381f1bd4f9ce02d4c0f0212d3f2e95a0 | SHA256 file hash | Case No.86-2025.jar (Java downloader) |
6a9f195f6fa9b298b94235b9b7dfa415f67ce29d0f5135d3e6705a | SHA256 file hash | email.js (Outlook email stealer) |
8bcba87df6d459a573441fb848b90451d65bce3a0f2ac08844c09 | SHA256 File hash | Swift Confirmation Copy.pdf (decoy file) |
701435e822a78b82d53281af3ffb20b3732462ec99c6f36afdfc6f8 | SHA256 file hash | Swift Transaction Report.js (JavaScript downloader) |
f92240185abf62317800180aba0fbda19d8e494a693e5a223003f | SHA256 file hash | windowsdefi.jar (Blue Banana RAT) |
b0dcc56ae5e90f6f2f4d05c67950832550b05505731b298f8230f | SHA256 file hash | soso.jar (SambaSpy RAT) |
bc039b022d1a60cb519ae0f43f07d7155273867cc40ce780259597 | SHA256 file hash | core.jar (STRRAT RAT) |
6ebab76c90cb36c09119a922d38545326bb7f211d6b4b9792530e | SHA256 file hash | tg.jar (SessionBot Implant) |
tcp[:]//wwce.zapto[.]org:443 | Domain | C2 for SambaSpy and Blue Banana RATs |
tcp[:]//wce.zapto[.]org:443 | Domain | C2 for SambaSpy and Blue Banana RATs |
str-master[.]pw | Domain | C2 for STRRAT |
api.telegram[.]org | Domain | Exfiltration and bot communication via Telegram API |
https[:]//octupusgreat.s3.us-east-1.amazonaws[.]com | URL | Initial payload hosted on Amazon S3 bucket |
https[:]//seasongretting.s3.eu-west-1.amazonaws[.]com | URL | Payloads hosted on Amazon S3 bucket |
https[:]//seasonmonster.s3.us-east-1.amazonaws[.]com | URL | Payloads hosted on Amazon S3 bucket |
https[:]//fullpremier.s3.eu-west-1.amazonaws[.]com | URL | Payloads hosted on Amazon S3 bucket |
java -jar Tranzacție+în+USD-pdf.jar | Process | Malware execution command |
tasklist.exe | Process | Used by malware to enumerate analysis tools |
wscript.exe email.js | Process | Executes email theft process |
swiftzjy1@financeplus[.]me | Email Address | Threat actor email |
swiftkbp1@farmaciafamiliei[.]md | Email Address | Threat actor email |
swiftkcs1@farmaciafamiliei[.]md | Email Address | Threat actor email |
swiftotb1@financeplus[.]me | Email Address | Threat actor email |
swiftugt1@financeplus[.]me | Email Address | Threat actor email |
swiftvqz1@financeplus[.]me | Email Address | Threat actor email |
swiftzjy1@financeplus[.]me | Email Address | Threat actor email |
Swift Confirmation Copy.jar | Java Archive file | Malicious JAR used in initial execution |
Swift Transaction Report.js | JavaScript file | Obfuscated JavaScript loader |
Swift Confirmation Copy.pdf | PDF file | Decoy PDF file shown after initial infection |
IBM X-Force Premier Threat Intelligence is now integrated with OpenCTI by Filigran, delivering actionable threat intelligence about this threat activity and more. Access insights on threat actors, malware and industry risks. Install the X-Force OpenCTI Connector to enhance detection and response, strengthening your cybersecurity with IBM X-Force’s expertise. Get a 30-Day X-Force Premier Threat Intelligence trial today!