OneNote Abused by Cybercriminals

Threat actors are taking advantage of Microsoft OneNote’s ability to embed files and use social engineering techniques, such as phishing emails and lures inside the OneNote document, to get unsuspecting users to download and open malicious files. Once clicked, an attacker can use the embedded code for various malicious purposes, such as stealing data or installing ransomware on victims’ systems. 

Using OneNote is an example of a shift away from macro-enabled documents after Microsoft tightened security measures for files downloaded from the Internet, making macro-based attacks less effective.

OneNote Abused by Cybercriminals
Scroll to top



Click on the available contact below to chat on WhatsApp

Or you can Email us at

× How can I help you?