Svg Phishing Campaign Targets Ukraine
Key topics
The SVG file triggered a password-protected archive containing a CHM file that launched a loader called “CountLoader,” enabling fileless execution, process hollowing, and DLL side-loading.
This combination of stealer + miner, delivered through an SVG-based chain, shows a growing sophistication in phishing campaigns, especially those aimed at critical sectors.
Full report: https://www.fortinet.com/jp/blog/threat-research/svg-phishing-hits-ukraine-with-amatera-stealer-pureminer
A phishing campaign targeting Ukrainian organizations uses an SVG file to deploy information-stealing malware and a crypto-miner, highlighting growing sophistication in phishing attacks.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
12m
Peak period
2
8-10h
Avg / period
1.3
Key moments
- 01Story posted
Oct 29, 2025 at 10:44 AM EDT
2 months ago
Step 01 - 02First comment
Oct 29, 2025 at 10:56 AM EDT
12m after posting
Step 02 - 03Peak activity
2 comments in 8-10h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 30, 2025 at 6:06 AM EDT
2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.