{"id":168432,"date":"2023-05-08T04:10:18","date_gmt":"2023-05-08T11:10:18","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=168432"},"modified":"2025-06-04T04:02:54","modified_gmt":"2025-06-04T11:02:54","slug":"shtml-phishing-attack-with-blurred-image","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/","title":{"rendered":"New Wave of SHTML Phishing Attacks"},"content":{"rendered":"<p><span class=\"NormalTextRun SCXW54400800 BCX0\">Authored <\/span><span class=\"NormalTextRun SCXW54400800 BCX0\">By Anuradha<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML (SHTML) files. The SHTML files are commonly associated with web servers redirecting users to malicious, credential-stealing websites or display phishing forms locally within the browser to harvest user-sensitive information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">SHTML Campaign in the field:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Figure 1. <\/span><span data-contrast=\"none\">shows the geological distribution of McAfee clients who detect malicious SHTML files.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168433\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure1.png\" alt=\"\" width=\"633\" height=\"385\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure1.png 633w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure1-300x182.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure1-205x125.png 205w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW9451030 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW9451030 BCX0\" data-ccp-parastyle=\"No Spacing\">Figure <\/span><span class=\"NormalTextRun SCXW9451030 BCX0\" data-ccp-parastyle=\"No Spacing\">1. McAfee<\/span><span class=\"NormalTextRun SCXW9451030 BCX0\" data-ccp-parastyle=\"No Spacing\"> Client Detection of SHTML<\/span><\/span><span class=\"EOP SCXW9451030 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Attackers victimize users by distributing SHTML files as email attachments.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"auto\">The sentiments used in such phishing emails include a payment confirmation, invoice, shipment etc., The email contains a small thread of messages to make the recipient more curious to open the attachment.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168447\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure2.png\" alt=\"\" width=\"539\" height=\"250\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure2.png 539w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure2-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure2-205x95.png 205w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW93106572 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW93106572 BCX0\" data-ccp-parastyle=\"No Spacing\">Figure <\/span><span class=\"NormalTextRun SCXW93106572 BCX0\" data-ccp-parastyle=\"No Spacing\">2<\/span><span class=\"NormalTextRun SCXW93106572 BCX0\" data-ccp-parastyle=\"No Spacing\">. Email with SHTML attachment<\/span><\/span><span class=\"EOP SCXW93106572 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><b><span data-contrast=\"auto\">Analysis:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">When the SHTML attachment is clicked, it opens a blurred fake document with a login page in the browser as shown in Figure 3. To read the document, however, the user must enter his\/her credentials. In some cases, the email address is prefilled.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168461\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure3.png\" alt=\"\" width=\"694\" height=\"308\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure3.png 694w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure3-300x133.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure3-205x91.png 205w\" sizes=\"auto, (max-width: 694px) 100vw, 694px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW161511803 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW161511803 BCX0\" data-ccp-parastyle=\"No Spacing\">Figure <\/span><span class=\"NormalTextRun SCXW161511803 BCX0\" data-ccp-parastyle=\"No Spacing\">3<\/span><span class=\"NormalTextRun SCXW161511803 BCX0\" data-ccp-parastyle=\"No Spacing\">. <\/span><span class=\"NormalTextRun SCXW161511803 BCX0\" data-ccp-parastyle=\"No Spacing\">Fake <\/span><span class=\"NormalTextRun SCXW161511803 BCX0\" data-ccp-parastyle=\"No Spacing\">PDF document<\/span><\/span><span class=\"EOP SCXW161511803 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168475\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure4.png\" alt=\"\" width=\"694\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure4.png 694w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure4-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure4-205x101.png 205w\" sizes=\"auto, (max-width: 694px) 100vw, 694px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW147930896 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW147930896 BCX0\" data-ccp-parastyle=\"No Spacing\">Figure 4. Fake Excel document<\/span><\/span><span class=\"EOP SCXW147930896 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168489\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure5.png\" alt=\"\" width=\"624\" height=\"486\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure5.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure5-300x234.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure5-166x129.png 166w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW217703873 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW217703873 BCX0\" data-ccp-parastyle=\"No Spacing\">Figure <\/span><span class=\"NormalTextRun SCXW217703873 BCX0\" data-ccp-parastyle=\"No Spacing\">5. Fake<\/span><span class=\"NormalTextRun SCXW217703873 BCX0\" data-ccp-parastyle=\"No Spacing\"> DHL Shipping<\/span><span class=\"NormalTextRun SCXW217703873 BCX0\" data-ccp-parastyle=\"No Spacing\"> document<\/span><\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Attackers commonly use JavaScript in the SHTML attachments that will be used either to generate the malicious phishing form or to redirect or to hide malicious URLs and behavior.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168503\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure6.png\" alt=\"\" width=\"696\" height=\"375\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure6.png 696w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure6-300x162.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure6-205x110.png 205w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW140751806 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW140751806 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW140751806 BCX0\">6<\/span><span class=\"NormalTextRun SCXW140751806 BCX0\">. SHTML with JavaScript code<\/span><\/span><span class=\"EOP SCXW140751806 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Below is the code snippet that shows how the blurred background image is loaded. The blurred images are taken from legitimate websites such as:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[900],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">https:\/\/isc.sans.edu\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[900],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">https:\/\/i.gyazo.com<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[900],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168517\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure7.png\" alt=\"\" width=\"710\" height=\"342\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure7.png 710w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure7-300x145.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure7-205x99.png 205w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW125001293 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW125001293 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">7<\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">. <\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">Code to load b<\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">lurred <\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">image<\/span><span class=\"NormalTextRun SCXW125001293 BCX0\">\u00a0<\/span><\/span><span class=\"EOP SCXW125001293 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><b><span data-contrast=\"auto\">Abusing submission form service:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[492],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Phishing attacks abuse static form service providers to steal sensitive user information, such as Formspree and Formspark<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Formspree.io<\/span><\/b><span data-contrast=\"auto\"> is a back-end service that allows developers to easily add forms on their website without writing server-side code, it also handles form processing and storage. It takes HTML form submissions and sends the results to an email address.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[492],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The attackers use the formpsree.io URL as an action URL which defines where the form data will be sent. Below Figure 8. shows the code snippet for action URL that works in conjunction with POST method.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168531\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure8.png\" alt=\"\" width=\"720\" height=\"190\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure8.png 720w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure8-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure8-205x54.png 205w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW84696281 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW84696281 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW84696281 BCX0\">8<\/span><span class=\"NormalTextRun SCXW84696281 BCX0\">. Formspree.io<\/span><span class=\"NormalTextRun SCXW84696281 BCX0\"> as<\/span><span class=\"NormalTextRun SCXW84696281 BCX0\"> action URL with POST method<\/span><\/span><span class=\"EOP SCXW84696281 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">When the user enters the credentials and hits the \u201csubmit\u201d button, the data is sent to Formspree.io. Subsequently, Formspree.io forwards the information to the specified email address. Below Figure 9. shows the flow of user submission data from webpage to attacker email address.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168545\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure9.png\" alt=\"\" width=\"650\" height=\"182\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure9.png 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure9-300x84.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure9-205x57.png 205w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW194040616 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194040616 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW194040616 BCX0\">9. Flow of user submission data<\/span><\/span><span class=\"EOP SCXW194040616 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW174287387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW174287387 BCX0\">Known malicious forms<\/span> <span class=\"NormalTextRun SCXW174287387 BCX0\">may<\/span><span class=\"NormalTextRun SCXW174287387 BCX0\"> be blocked<\/span><span class=\"NormalTextRun SCXW174287387 BCX0\">, preventing<\/span><span class=\"NormalTextRun SCXW174287387 BCX0\"> the form submission data <\/span><span class=\"NormalTextRun SCXW174287387 BCX0\">from <\/span><span class=\"NormalTextRun SCXW174287387 BCX0\">being sent to the <\/span><span class=\"NormalTextRun SCXW174287387 BCX0\">attacker. Below<\/span><span class=\"NormalTextRun SCXW174287387 BCX0\"> Figure<\/span> <span class=\"NormalTextRun SCXW174287387 BCX0\">10<\/span><span class=\"NormalTextRun SCXW174287387 BCX0\">. shows the Form blocked due to suspected fraudulent activity.<\/span><\/span><span class=\"EOP SCXW174287387 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168559\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure10.png\" alt=\"\" width=\"610\" height=\"242\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure10.png 610w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure10-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure10-205x81.png 205w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW124437761 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW124437761 BCX0\">Figure 10<\/span><span class=\"NormalTextRun SCXW124437761 BCX0\">. Form <\/span><span class=\"NormalTextRun SCXW124437761 BCX0\">B<\/span><span class=\"NormalTextRun SCXW124437761 BCX0\">locked<\/span><\/span><span class=\"EOP SCXW124437761 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[5260],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">To prevent the user from recognizing that they\u2019ve just been phished, the attacker redirects the user\u2019s browser to an unrelated error page that is associated to a legitimate website.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Below Figure 11.\u00a0 shows the redirected webpage.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168573\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure11.png\" alt=\"\" width=\"650\" height=\"274\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure11.png 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure11-300x126.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Figure11-205x86.png 205w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW87207434 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW87207434 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW87207434 BCX0\">11<\/span><span class=\"NormalTextRun SCXW87207434 BCX0\">. Redirected <\/span><span class=\"NormalTextRun SCXW87207434 BCX0\">webpage<\/span><\/span><span class=\"EOP SCXW87207434 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">To conclude, phishing is a form of social engineering in which attackers trick people into disclosing confidential information or installing malware. It is a widespread and pervasive problem. This blurry image phishing scam uses simple basic HTML and JavaScript code, but it can still be effective. A blurry image is enough to trick many users into believing the email as legitimate. To stay protected, users<\/span><span data-contrast=\"none\"> should keep their system up-to-date and refrain from clicking links and opening SHTML attachments that comes through email from untrusted sources.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">IOCs<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">McAfee customers are protected against this phishing campaign.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"3\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"69905\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"69905\">\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"3\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Type\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Value\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Product\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Detected\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">URL\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">formspree[.]io\/f\/xjvderkn<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">McAfee WebAdvisor\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Blocked\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">URL\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">cianindustries[].com\/error\/excel.php<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">McAfee WebAdvisor\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Blocked\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"2\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">URL\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">twenty88[.]com\/mincs\/mea.ph<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">McAfee WebAdvisor\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Blocked\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">URL\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">sweet.classicbo[.]com\/mailb_fixpd.ph<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">McAfee WebAdvisor\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Blocked\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"69905\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"4\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Type<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Value<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Product<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Detected<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">shtml(Adobe)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">0a072e7443732c7bdb9d1f3fdb9ee27c<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">HTML\/Phishing.qz<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">shtml(Excel)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">3b215a37c728f65c167941e788935677<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">HTML\/Phishing.rb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">shtml(DHL)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">257c1f7a04c93a44514977ec5027446c<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:420}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">HTML\/Phishing.qz<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has&#8230;<\/p>\n","protected":false},"author":695,"featured_media":169189,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-168432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Wave of SHTML Phishing Attacks | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Wave of SHTML Phishing Attacks | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T11:10:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T11:02:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"New Wave of SHTML Phishing Attacks\",\"datePublished\":\"2023-05-08T11:10:18+00:00\",\"dateModified\":\"2025-06-04T11:02:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\",\"name\":\"New Wave of SHTML Phishing Attacks | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png\",\"datePublished\":\"2023-05-08T11:10:18+00:00\",\"dateModified\":\"2025-06-04T11:02:54+00:00\",\"description\":\"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"New Wave of SHTML Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Wave of SHTML Phishing Attacks | McAfee Blog","description":"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New Wave of SHTML Phishing Attacks | McAfee Blog","og_description":"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-05-08T11:10:18+00:00","article_modified_time":"2025-06-04T11:02:54+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"New Wave of SHTML Phishing Attacks","datePublished":"2023-05-08T11:10:18+00:00","dateModified":"2025-06-04T11:02:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/"},"wordCount":689,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/","name":"New Wave of SHTML Phishing Attacks | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png","datePublished":"2023-05-08T11:10:18+00:00","dateModified":"2025-06-04T11:02:54+00:00","description":"Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has been abusing server-parsed HTML","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_SHTML-Phishing-Attacks.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/shtml-phishing-attack-with-blurred-image\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"New Wave of SHTML Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=168432"}],"version-history":[{"count":11,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168432\/revisions"}],"predecessor-version":[{"id":215104,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168432\/revisions\/215104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/169189"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=168432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=168432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=168432"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=168432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}