top of page

OneNote on the latest phishing tactics

The Microsoft OneNote application is being abused by threat actors to bypass phishing detection rules and compromise victims.



A large proportion of the malware delivered through OneNote has been identified as AsyncRat, Gozi and CryptOne.


It appears that once again Microsoft applications are being incorporated into phishing attacks, this time OneNote is the application of choice for those seeking to infect victims with malware in lieu of Microsoft VBA macros.


Since OneNote is included in the MS Office package, it is installed on all Windows devices by default regardless of if it being used or not by the potential victim.


The same social engineering techniques such as brand impersonation are still employed to help convince the user of the email’s legitimacy.



Opening the OneNote attached will not execute any scripts but will contain an embedded attachment/script disguised to look as legitimate and appropriate as possible, which when clicked will execute and begin the delivery of malware which has largely been in the form of remote access tools and information stealers designed to exfiltrate a victim’s financial information.


Organisationg that take a proactive approach to combat social engineering attacks by providing training to their staff should ensure that training is up to date to include these new changes in tactics, techniques, and procedures (TTPs).


It is much less effective for a threat actor to send an MS Word or Excel attachment these days, as such, educating personnel to be aware of phishing with OneNote or compressed files containing unusual attachments should be included.

 

Reporting

Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).

 

Comentários


The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.

 

EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page