Subj : Microsoft OneNote is still being used to flood devices with malwa To : All From : TechnologyDaily Date : Fri Mar 03 2023 15:30:03 Microsoft OneNote is still being used to flood devices with malware Date: Fri, 03 Mar 2023 15:13:40 +0000 Description: NoteBook files are growing more popular among the cybercrime community for their ability to deliver malware to target endpoints. FULL STORY ====================================================================== Microsofts OneNote, a note-taking app thats part of the Office 365 productivity suite , is drawing increasingly more attention to itself, for all the wrong reasons. This follows another report from cybersecurity researchers describing how more and more threat actors are beginning to use the application to deliver malware to unsuspecting victims. This time, researchers from Zscaler published a report describing OneNote as a growing threat for malware distribution. Fake invoices and orders The delivery method is similar to that of macro-powered Office files. The attackers would generate a OneNote file, called a NoteBook, designing it to look like an important document such as an invoice or something similar. Inside the file, they would place a malicious attachment capable of downloading and running a piece of malware from a third-party server. Then, theyd blur the file's contents and overlap it with a button saying Click here to view, or a similar call to action. Read more > These are the best firewalls around > Malicious use of Microsoft OneNote documents on the rise > Microsoft OneNote attachments are being used to spread malware Clicking the button would activate the add-on and run the malware. The file would then be distributed the usual way - via email. Hundreds of thousands of phishing emails are being sent daily, targeting corporate endpoints, personal computers, and other devices holding sensitive customer and personal data. Last summer, Microsoft finally disabled Office programs from running macros in files downloaded from the internet. That way, the company effectively terminated one of the most popular attack vectors among the cybercriminal community. Since then, hackers were hard at work, looking for alternative ways to deliver malware. Two methods began standing out - delivering an ISO file (a type of archive file that enables hackers to bypass email and antivirus security), and delivering NoteBook files. To protect against these types of attacks, cybersecurity researchers usually advise common sense - not to download email attachments, or click on links in emails whose contents, sender address, or subject line, sound even remotely suspicious. Check out the best endpoint protection tools today ====================================================================== Link to news story: https://www.techradar.com/news/microsoft-onenote-is-still-being-used-to-flood- devices-with-malware --- Mystic BBS v1.12 A47 (Linux/64) * Origin: tqwNet Technology News (1337:1/100) .