What's Happening?
A phishing campaign using SVG image attachments has been linked to a phishing-as-a-service (PhaaS) operation targeting Microsoft 365 credentials. The campaign, identified as Tykit, employs SVG images that
mimic pop-ups to distract users while executing JavaScript in the background. Victims are redirected to a fake Microsoft 365 login page via a 'trampoline' page. The operation has targeted industries such as finance, IT, and government, with significant activity in the U.S., Canada, and Southeast Asia. The phishing infrastructure, analyzed by ANY.RUN, shows a sophisticated attack flow with command-and-control URLs containing the string 'segy.'
Why It's Important?
The Tykit phishing campaign highlights the evolving tactics of cybercriminals, particularly the use of SVG files in phishing attacks. The operation's focus on Microsoft 365 credentials poses a significant threat to organizations relying on these services for communication and data management. The campaign's reach across multiple industries and countries underscores the need for heightened awareness and improved security measures to protect against such sophisticated phishing tactics. Organizations must educate employees on recognizing phishing attempts and implement robust security protocols to safeguard sensitive information.
What's Next?
Organizations are advised to treat SVG files with caution and monitor for indicators of compromise associated with the Tykit campaign. Security teams should update their defenses to detect and block requests to 'segy' domains and similar phishing infrastructure. As the campaign continues to evolve, cybersecurity experts will likely focus on developing new strategies to counteract these phishing-as-a-service operations. Increased collaboration between industry stakeholders may also be necessary to address the broader implications of such attacks.