March 1, 2023, 4 p.m. | Meghraj Nandanwar

Security Boulevard securityboulevard.com

Attackers are increasingly using OneNote documents to distribute malware, due to the heightened security measures against macro-based attacks and the widespread adoption and popularity of the platform. Analyzing several related case studies, this article showcases the obfuscation techniques used by threat actors to bypass threat detection measures and deceive users into executing malware on their systems via OneNote.


Key Takeaways:


Threat actors are increasingly using Microsoft OneNote documents to deliver malware via phishing emails.

OneNote is installed by default in …

adoption article attackers attacks bypass case case studies detection distribution documents key macro malware malware distribution microsoft microsoft onenote obfuscation onenote phishing platform security studies systems techniques threat threat actors threat detection

Director, Cyber Risk

@ Kroll | South Africa

Security Engineer, XRM

@ Meta | New York City

Security Analyst 3

@ Oracle | Romania

Internship - Cyber Security Operations

@ SES | Betzdorf, LU

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

IT Security Engineer

@ Timocom GmbH | Erkrath, Germany