TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
SVG file scam installs malware via Facebook posts

SVG file scam installs malware via Facebook posts

A Malwarebytes report details how hackers embed malicious code in SVG image files shared via adult-themed Facebook posts, installing malware that forces fake likes to boost scam content visibility.

Emre ÇıtakbyEmre Çıtak
11 August 2025
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

Hackers are increasingly exploiting the rise of age verification requirements by embedding malware within Scalable Vector Graphics (SVG) image files, subsequently distributing them through deceptive Facebook posts. This trend, reported by Skye Jacobs on August 9, 2025, capitalizes on users migrating to less regulated websites, inadvertently exposing them to heightened security risks.

As more countries impose age verification on adult websites, smaller sites are resorting to hidden malware schemes to inflate their social media presence, particularly on platforms like Facebook. Researchers at Malwarebytes recently uncovered that these schemes frequently leverage SVG files, a format that, unlike standard JPG or PNG images, is XML-based and capable of embedding HTML and JavaScript. This inherent capability allows attackers to conceal malicious code within seemingly innocuous image files.

The scam operates by sharing adult-themed blog posts, often featuring fake or AI-generated celebrity content, on Facebook. When users click on these links, they are prompted to download an SVG image. Interacting with or opening this SVG file triggers hidden JavaScript embedded within it. Malwarebytes researchers noted that the malicious code is highly obfuscated, using minimalist character sets and clever coding to evade detection.

Upon execution, the hidden script downloads additional malicious code from associated websites, leading to the installation of malware identified as Trojan.JS.Likejack. This Trojan covertly forces the victim’s browser to “Like” specific Facebook posts or pages, provided the user is already logged into their Facebook account. These automated “Likes” surreptitiously promote adult content and boost visibility within Facebook’s algorithm, allowing scammers to gain exposure without incurring advertising costs.

Malwarebytes discovered that a significant portion of the pages involved in this campaign are built on WordPress and are interconnected. Furthermore, numerous Blogspot[.]com pages were identified as part of the same scheme. While the use of SVG files for malware distribution is not a novel tactic—having been previously employed for phishing and scripting attacks—this particular campaign stands out for its sophisticated concealment of harmful code and its clever manipulation of social media platforms to drive traffic and enhance visibility. Despite Facebook’s ongoing efforts to dismantle fake profiles, scammers perpetually create new ones, perpetuating a difficult cycle to fully disrupt due to the anonymous nature of the internet.

Tags: Facebookmalwaresvg
ShareTweet
Emre Çıtak

Emre Çıtak

Emre’s love for animals made him a veterinarian, and his passion for technology made him an editor. Making new discoveries in the field of editorial and journalism, Emre enjoys conveying information to a wide audience, which has always been a dream for him.

Related Posts

Apple begins iPhone 18 series production testing in January

Apple begins iPhone 18 series production testing in January

24 December 2025
EA investigates AI claims in Battlefield 6 cosmetics

EA investigates AI claims in Battlefield 6 cosmetics

24 December 2025
Amazon Alexa+ will book your hotels and salons starting in 2026

Amazon Alexa+ will book your hotels and salons starting in 2026

24 December 2025
OpenAI launches Skills in Codex

OpenAI launches Skills in Codex

24 December 2025

LATEST

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

How to connect a PS4 controller to Steam via USB or Bluetooth

How to connect your phone to Wi-Fi and fix connection issues

Apple begins iPhone 18 series production testing in January

EA investigates AI claims in Battlefield 6 cosmetics

Amazon Alexa+ will book your hotels and salons starting in 2026

OpenAI launches Skills in Codex

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska