Tuesday, March 4, 2025
HomeRansomwareLocky Ransomware spreading through Facebook Messenger Via SVG File

Locky Ransomware spreading through Facebook Messenger Via SVG File

Published on

SIEM as a Service

Follow Us on Google News

SVG(Scalable Vector Graphics) send by your friend may have Locky Ransomwares, avoid clicking it. By appending the Ransomware to an image file can Bypass Facebook security framework pretending to be an image file.

SVG (Scalable Vector Graphics):

SVG is an XML-based vector image format for two-dimensional graphicswith support for interactivity and animation. The SVGspecification is an open standard developed by the World Wide Web Consortium (W3C) since 1999. SVGimages and their behaviors are defined in XML text files.

Ransomware:

A type of malicious software designed to block access to a computer system until a sum of money is paid.

Why make’s it as a Dropper?

SVG images can be created and edited with any text editor, more often they are created directly with a software that elaborates the images.More specifically, this means that you can embed any content you want (such as JavaScript), additionally, any modern browser will therefore able to open this file.

How do we Remove Malicious Extensions 

Firefox and Chrome has already blocked this extension and we hope Facebook will do that soon. Suppose if you are tricked into installing in this malware file you should remove them immediately.

To remove the offending extension, just go to Menu → More Tools → Extensions and check for the extension and remove it.Even worse, if you were infected with the ransomeware the only way is to restore the files. Stay safe.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit Microsoft Teams & Quick Assist for Remote Access

Cybersecurity researchers have uncovered a sophisticated campaign in which threat actors are exploiting Microsoft...

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...