Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used to install further malware, steal passwords, or even cryptocurrency wallets.
This comes after attackers have been distributing malware in emails using malicious Word and Excel attachments that launch macros to download and install malware for years.
However, in July, Microsoft finally disabled macros by default in Office documents, making this method unreliable for distributing malware…
Not to be deterred, threat actors quickly switched to using a new file format in their malicious spam (malspam) attachments: Microsoft OneNote attachments…
From samples found by BleepingComputer, these malspam emails pretend to be DHL shipping notifications, invoices, ACH remittance forms, mechanical drawings, and shipping documents…
Unlike Word and Excel, OneNote does not support macros, which is how threat actors previously launched scripts to install malware.
Instead, OneNote allows users to insert attachments into a NoteBook that, when double-clicked, will launch the attachment.
Threat actors are abusing this feature by attaching malicious VBS attachments that automatically launch the script when double-clicked to download malware from a remote site and install it…
-
Hackers now use Microsoft OneNote attachments to spread malware
- This topic has 2 replies, 3 voices, and was last updated 7 months, 4 weeks ago.
AuthorViewing 1 reply threadAuthorViewing 1 reply thread