×
Hackers use AI to hide malware inside business charts in unfortunate new cyberattack
Written by
Published on
Join our daily newsletter for breaking news, product launches and deals, research breakdowns, and other industry-leading AI coverage
Join Now

Microsoft researchers have uncovered a sophisticated phishing campaign where hackers use artificial intelligence to hide malicious code inside business chart graphics, marking a new evolution in AI-powered cyberattacks. The technique disguises harmful JavaScript within seemingly innocuous SVG files by encoding malware as business terminology like “revenue” and “shares,” which hidden scripts then decode to steal user credentials and browser data.

What you should know: The attack method represents a significant advancement in phishing obfuscation techniques that bypasses traditional security filters.

  • Hackers compromised a small business email account and used it to distribute malicious SVG files disguised as PDF documents through BCC targeting.
  • The SVG files appeared as blank business charts but contained invisible malicious code encoded using business-related language.
  • Hidden scripts decoded the business terms into executable commands that redirected browsers to phishing sites and harvested login credentials.

How the AI obfuscation works: Instead of typical cryptographic methods, the attackers used business vocabulary to mask their malicious intent.

  • The malware was encoded as strings of legitimate business words like “revenue” and “shares” rather than traditional code obfuscation.
  • Charts remained completely invisible to users, showing only blank graphics when opened.
  • Background scripts automatically read the encoded business terms, decoded them, and executed malicious actions including user tracking and data collection.

In plain English: Think of it like hiding a secret message in a business report—the attackers took harmful computer code and disguised it as normal business words, then programmed the file to automatically translate those words back into malicious actions when someone opened it.

Why this matters: Microsoft’s analysis indicates the code complexity suggests AI generation rather than human programming.

  • Microsoft Security Copilot, the company’s AI security tool, assessed that the code was “not something a human would typically write from scratch due to its complexity, verbosity, and lack of practical utility.”
  • The technique exploits SVG files’ ability to embed JavaScript, allowing attackers to bypass security filters more effectively than traditional methods.
  • This represents an escalation from AI simply crafting convincing phishing email content to actually generating sophisticated code obfuscation techniques.

The bigger picture: SVG files present unique security challenges due to their dual nature as both graphics and executable content.

  • As scalable vector graphics supporting embedded scripts, SVG files are increasingly exploited for phishing attacks.
  • The business terminology encoding makes detection significantly more difficult for both automated security systems and human analysts.
  • This campaign demonstrates how threat actors are leveraging AI not just for social engineering but for technical evasion capabilities.
Watch out - hackers are using AI to make phishing emails even more convincing

Recent News

Cambridge researchers use AI to map hedgehog habitats from satellite data

The bramble detector uses simple machine learning, not complex models like ChatGPT.

3 steps to implement AI ethics that build trust and competitive advantage

Amazon's AI recruiting tool revealed hidden biases when it systematically discriminated against women.

Google rolls out 4 audio enhancements for Pixel Buds Pro 2 earbuds

The update transforms solid performers into context-aware devices that adjust to your environment.