Inception Cyber | INTENT-BASED SECURITY Blogs

Smuggled Signals: Stealer Distributed via HTML Trojan

Written by Kalpesh Mantri, Principal Research Engineer | Jul 22, 2025 10:38:46 PM

Quick Read:

Strategy to Deliver Malicious Attachment

  • Impersonation of a B2B procurement inquiry using a fake business proposal.


Tactics Observed

  • Email uses formal buyer semantics to lure corporate targets.
  • Attachment is an HTML file with embedded SVG mimicking a download proposal.
  • HTML initiates download of a password-protected ZIP from GitHub's raw content delivery network.
  • Embedded JavaScript auto-copies the password to the clipboard, nudging user interaction.
  • HTML contains no obfuscation or encoding, yet bypasses all static scanners effortlessly.


VirusTotal
Detection Status

  • Despite having no obfuscation, no URL encoding, and a clearly embedded download link, the HTML file
    maintains a zero-detection score on Virus Total; only NACETM detected attachment at the time of writing this blog.


Payload

  • Octalyn Stealer — a C++/Delphi-based infostealer abusing Telegram for exfiltration.
Target Data
  • Browser credentials, Crypto wallets, Discord/Telegram tokens, Gaming accounts, VPN config.
Deployment
  • NACETM deployed to analyze emails behind Google Workspace (G-Suite).

Introduction

Security researchers at InceptionCyber AI have observed a new phishing campaign leveraging HTML smuggling to distribute the Octalyn Stealer, a potent info-stealing malware. This campaign specifically targets enterprises under the guise of B2B inquiries, bypassing traditional email filters and endpoint defenses using one of the most evasive malware delivery mechanisms in use today.

HTML smuggling again recently surged in adoption due to its ability to evade network perimeter controls. Unlike attachments or embedded links to executables, HTML smuggling exploits the browser’s trust in locally created objects by using embedded JavaScript or SVG blobs to dynamically reconstruct malicious payloads on the victim’s machine. In essence, HTML smuggling turns the victim’s own browser into a payload builder. When paired with social engineering — as this campaign does — it creates an attack vector that slips silently through corporate defenses.

 

Initial Access Phase: A Business Proposal Bait

In this campaign, the attack begins with a well-crafted email sent to corporate inboxes. It impersonates a legitimate business inquiry with a subject line related to B2B enquiry — like “Inquiry Regarding Product Customization and Quotation for Q4 2025 Order”.

Image: Email delivering Malicious Attachment

 

Characteristics of the Attack

Intent / Tone: Formal, B2B buyer semantics mimicking procurement departments.

Attachment: A single HTML file labelled proposal.html. Proposal in HTML - a red flag, yet often overlooked.

Once opened, the HTML file renders an SVG-based page mimicking a document viewer. It includes:

  • A fake download button (“Download Proposal Now”) embedded in HTML.
  • A direct download link:
    https[:]//raw[.]githubusercontent[.]com/Procurement-Vibrant-Sales-Depertment/Secured/main/Business_Proposal_Q4_2025_International_Trade_Catalogue_V2_1_4_Signed[.]zip
  • A visible access-code: Trade2025$ecure1

 

HTML has a script appended that helps the user copy the access code, which seems helpful — but is doing more than it appears. This is a subtle psychological tactic: guide the user gently toward launching the next stage without alarms.

 

Image: Appended Script

 

The effectiveness of HTML smuggling is evident in this campaign — despite having no obfuscation, no URL encoding, and a clearly embedded download link, the HTML file maintains a zero-detection score on VirusTotal. This underscores just how ineffective static engines have become against modern threats.

 

Virus total Score of the Attachment

 

 

Exploitation Payload : The Octalyn Stealer

Image: Attack Chain

 

Once the ZIP is extracted using the copied password, the victim encounters a file posing as an MS-Word document — which in reality is the Octalyn Stealer executable. Octalyn is not just another commodity malware. It is part of a new wave of open-source, modular info-stealers, hosted brazenly on public repositories like GitHub.

 

Octalyn’s Analysis:

The GitHub repository features a streamlined interface that allows attackers to easily configure their Telegram bot token and chat ID, making the entire operation alarmingly accessible—even for low-skilled threat actors.

 

Written in

C++/Delphi — uncommon, making detection less consistent across AV engines.

Control Panel


GUI-driven, simplifying attacker operation.

Real-time victim monitoring capabilities

Cross-platform support (Windows and Linux)

System Targets

Compatible from Windows XP to Windows 11.

Exfiltration Method


Telegram Bot API — stealthy, encrypted, and real-time.


 

The use of Telegram for exfiltration is a growing trend among info-stealers. Telegram traffic is encrypted, blends with normal traffic, and is difficult to block without affecting legitimate business communications.

 

Octalyn’s Targeted Data Includes:

 

INTENT-BASED THREAT PREVENTIONTM  

Despite the stealthiness of HTML smuggling, InceptionCyber’s INTENT-BASED THREAT PREVENTIONTM AI platform detected and blocked this attack in early stages. Neural Analysis and Correlation Engine (NACETM), neutralized this attack by correlating header artifacts with semantic analysis in real time. Rather than relying on static blocklists, NACETM applies semantic and thematic analysis to every message, extracting higher-order feature tags that remain stable even when the adversary rotates the payloads.

Key Engine Signals were:

  • Subject Intent Analysis: Indicates a request for “information” and/or “quotation”, commonly used by buyers initiating contact.
  • Body Semantic Analysis: NACETM identified inconsistencies between the "business proposal" theme and an attached proposal in HTML with zip downloader URI.
  • URL Auxiliary Signals: Recognized GitHub infrastructure used to download zip files.
  • Attachment Signals: Identified anomalies in the use of clipboard API and hidden password logic inside what should have been a simple “business proposal” document.

By fusing these features, NACETM produced a high‑confidence verdict and quarantined the email before it reached end‑users—demonstrating the value of contextual, multi‑layer analysis over single‑point IOC checks and making it capable of detecting evasive, polymorphic attacks.

 

Image: Threat Detection Logs of Malicious Attachment

 

Conclusion

This campaign is a sobering reminder that email attachments can’t be trusted — even if they’re just HTML. HTML smuggling gives attackers the ability to deliver payloads that morph in the browser, dodging every traditional filter in the security stack.

Pair this with a modular, open-source malware like Octalyn Stealer, and you have a recipe for stealthy, scalable enterprise compromise. As malware delivery becomes more psychological and evasive, defenders need tools and mindsets that evolve just as fast.

NACE™ is an INTENT-BASED THREAT PREVENTIONTM AI Platform, that does not depend on the final payload or features from exploitation stage for deriving its verdict. Instead, it leverages semantic and thematic analysis to understand the underlying intent of email. By analyzing the contextual relationships between intent, auxiliary signals from URLs, deep file parsing results from attachment and SMTP headers, NACE™ proactively detects stealthy malspam vectors—often before users engage or the payload is delivered.

Stay vigilant, stay secure.

 

Learn more about how NACETM protects against Malicious Attachments, whether created by human threat actors or powered by AI.