Threat actors use various techniques to deliver their payloads whilst avoiding detection rules and systems, one such tactic is HTML smuggling; the method of obfuscating HTML attachments through means such as encoding.
Recently, Qakbot have employed this technique and taken it further by incorporating SVG images.
With detection rules becoming more advanced, paired with the disabling of VBA macros, tactics such as HTML smuggling have become more prominent as threat actors have sought vectors to deliver malicious content or navigate a potential victim to a malicious domain.
The user is then prompted to interact with the file, typically through entering a password supplied either in the SVG or email.
After the zip file is unlocked, an .iso file is extracted which aims to infect the host with Qakbot.
Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to email@example.com. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).