Wednesday, April 1, 2026

Hackers Use AI-Generated Code to Obfuscate Payloads and Bypass Traditional Defenses

A recent credential phishing campaign detected by Microsoft Threat Intelligence used AI-generated code within an SVG file to disguise malicious behavior.

While the novel obfuscation techniques showcased attacker ingenuity, AI-powered defenses successfully blocked the attack—underscoring that AI-augmented threats remain detectable when defenders adapt analytic strategies.

On August 18, Microsoft Threat Intelligence identified a targeted phishing campaign exploiting a compromised small business email account to distribute credential-stealing emails.

The attackers attached a file named “23mb – PDF- 6 pages.svg,” designed to masquerade as a PDF despite its SVG extension. SVGs are increasingly favored by threat actors because they allow text-based embedding of JavaScript and dynamic content, facilitating sophisticated obfuscation that can slip past static analysis and sandboxing.

Upon opening, the SVG redirected users to a CAPTCHA-based verification page, a familiar social engineering tactic intended to build user trust and delay suspicion.

Security verification prompt.
Security verification prompt.

Although defenders blocked access before the fake login page could appear, investigation revealed that embedded JavaScript within the SVG would have reconstructed a phishing landing page to harvest credentials.

Business Terminology as a Decoy

Rather than employing standard cryptographic obfuscation, the attackers used simulated business-analytics language to conceal their payload.

First, the SVG code began with invisible elements styled as a “Business Performance Dashboard,” complete with chart bars and month labels rendered with zero opacity and transparent fills—decoy artifacts intended to mislead anyone inspecting the file.

Second, the actual payload was encoded within a long sequence of business-related terms (e.g., revenue, operations, risk, shares) stored in a hidden data-analytics attribute of an invisible <text> element.

Sequence of business-related terms.
Sequence of business-related terms.

Embedded JavaScript then processed these terms through multiple transformation steps, mapping sequences of business terms to characters and instructions.

As the script executed, it systematically decoded the metadata to reconstruct functionality for redirection, browser fingerprinting, and session tracking—effectively hiding malicious behavior behind seemingly harmless corporate jargon.

Microsoft Security Copilot’s analysis determined the SVG code was likely generated by a large language model due to its complexity, verbose naming conventions (e.g., processBusinessMetricsf43e08), modular yet over-engineered structure, generic formal comments, and unnecessary inclusion of XML declarations and CDATA wrappers.

These characteristics illustrated typical AI-generated code artifacts, offering additional detection signals.

This systematic approach is characteristic of AI/LLM output, which tends to over-engineer and generalize solutions.

Example of over-engineered logic parsing the business terminology.
Example of over-engineered logic parsing the business terminology.

Despite the attackers’ use of AI for obfuscation, Microsoft Defender for Office 365’s AI-driven protections thwarted the campaign by analyzing infrastructure, behavior, and message context rather than solely inspecting payload code.

Key detection signals included self-addressed emails with BCC recipients, the suspicious choice of SVG files named like PDFs, redirects to domains linked to known phishing content, generic code obfuscation patterns, and network behaviors such as session tracking and fingerprinting.

To bolster defenses against similar AI-aided phishing threats, organizations should:

  1. Implement recommended settings for Exchange Online Protection and Defender for Office 365, including Safe Links for time-of-click URL verification.
  2. Enable Zero-hour Auto Purge (ZAP) to retroactively quarantine malicious emails.
  3. Promote use of browsers with SmartScreen filtering to block known phishing sites.
  4. Deploy cloud-delivered protection in antivirus solutions for rapid defense against novel attack variants.
  5. Adopt phishing-resistant authentication methods and enforce Conditional Access policies requiring strong authentication for critical applications.

As adversaries integrate AI into their offensive toolkits, security teams must continue leveraging AI-driven analytics that focus on attack patterns, infrastructure traits, and behavioral anomalies.

AI-generated obfuscation may evolve, but by shifting detection beyond code syntax to the broader context of phishing tactics, defenders can stay ahead of emerging threats.

Indicators of compromise

Here is the information in tabular form:

IndicatorTypeDescriptionFirst seenLast seen
kmnl[.]cpfcenters[.]deDomainDomain hosting phishing content08/18/202508/18/2025
23mb – PDF- 6 Pages[.]svgFile nameFile name of SVG attachment08/18/202508/18/2025

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility

Cisco is actively dealing with a major cybersecurity incident...

Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2026

In today's fast-paced software development world, where applications are...

Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution

Vim is a widely used, highly configurable text editor,...

CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools

Hackers are actively promoting a new malware-as-a-service (MaaS) platform...

Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec

New York, New York, April 1st, 2026, CyberNewswire TAC Infosec,...

Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests

Hackers are increasingly targeting hotel booking workflows to trick...

Related Articles

Recent News