Feb. 1, 2023, 3:01 p.m. | Roza Maille

TrustedSec www.trustedsec.com

See how Research Team Lead Carlos Perez dissects a sample of a OneNote document that was used to deploy ASyncRAT, an open-source remote admin tool, to enable phishing attacks. You’ll find out how these OneNote files are now being used by threat actors and where to find the location that ASyncRAT is being downloaded and...


The post How Threat Actors Use OneNote to Deploy ASyncRAT appeared first on TrustedSec.

asyncrat attacks document enable files find incident response incident response & forensics location malware analysis office 365 security assessment onenote phishing phishing attacks remote admin tool research team threat threat actors threat hunting tool trustedsec

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA