Microsoft OneNote is still being used to flood devices with malware

NordVPN schützt dich mitunter vor gemeinen, schädlichen Phishing-Attacken beim Surfen im Netz
(Image credit: Nord Security)

Microsoft’s OneNote, a note-taking app that’s part of the Office 365 productivity suite, is drawing increasingly more attention to itself, for all the wrong reasons. 

This follows another report from cybersecurity researchers describing how more and more threat actors are beginning to use the application to deliver malware to unsuspecting victims.

This time, researchers from Zscaler published a report describing OneNote as a “growing threat” for malware distribution.

Protecting your business from the biggest threats online

Protecting your business from the biggest threats online
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Fake invoices and orders

The delivery method is similar to that of macro-powered Office files. The attackers would generate a OneNote file, called a NoteBook, designing it to look like an important document such as an invoice or something similar. Inside the file, they would place a malicious attachment capable of downloading and running a piece of malware from a third-party server. Then, they’d blur the file's contents and overlap it with a button saying “Click here to view”, or a similar call to action. 

Clicking the button would activate the add-on and run the malware.

The file would then be distributed the usual way - via email. Hundreds of thousands of phishing emails are being sent daily, targeting corporate endpoints, personal computers, and other devices holding sensitive customer and personal data.

Last summer, Microsoft finally disabled Office programs from running macros in files downloaded from the internet. That way, the company effectively terminated one of the most popular attack vectors among the cybercriminal community. Since then, hackers were hard at work, looking for alternative ways to deliver malware. Two methods began standing out - delivering an ISO file (a type of archive file that enables hackers to bypass email and antivirus security), and delivering NoteBook files.

To protect against these types of attacks, cybersecurity researchers usually advise common sense - not to download email attachments, or click on links in emails whose contents, sender address, or subject line, sound even remotely suspicious.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
Microsoft Outlook targeted by new malware attacks allowing sneaky hijacking
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Outlook
Dangerous Microsoft Outlook flaw could let hackers send out malware via email
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost