Feb. 27, 2023, 8 a.m. | Nicholas Dhaeyer

NVISO Labs blog.nviso.eu

In recent weeks OneNote has gotten a lot of media attention as threat actors are abusing the embedded files feature in OneNote in their phishing campaigns.
In this post we will analyze this new way of malware delivery and create a detection rule for it.

abuse abusing attention campaigns cyber threats delivery detection detection engineering embedded file files maldoc malware media onenote phishing qakbot qbot reverse engineering threat threat actors threat hunting yara

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium