WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Emotet Malware Being Distributed Via Microsoft OneNote
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet Malware Being Distributed Via Microsoft OneNote

Author: Alec Davison

Created: Tuesday, March 21, 2023 - 18:02

Categories: Cybersecurity

Threat actors behind the infamous Emotet malware, which recently re-emerged this month to infect users through their inboxes once again, are now exploiting Microsoft OneNote to distribute the malware and bypass Microsoft security restrictions, according to security researchers at Malwarebytes.

Since mid-December 2022, threat actors have been increasingly exploiting Microsoft OneNote files to deliver malware and compromise victims. A successful Emotet attack typically leads to the delivery of additional malware, including ransomware. In this specific Emotet OneNote campaign, researchers observed malicious attachments being delivered in reply-chain emails with subjects that purport to be how-to guides, invoices, job references, and other lures. If the user downloads the attachment and executes the hidden malicious VBScript underneath the “View” button, the script will ultimately download Emotet. The malware will then quietly run on the device, stealing email, contacts, and awaiting further commands from the command-and-control server. To help organizations proactively defend against this activity, BleepingComputer posted comprehensive guidance on how to block malicious Microsoft OneNote files (posted below). Read more at Malwarebytes Labs or at BleepingComputer.

Additional WaterISAC Reporting on the OneNote infection vector and Emotet:

  • Cyber Resilience – How to Block Microsoft OneNote Files from Delivering Malware
  • Threat Awareness – Use of Microsoft OneNote to Spread Malicious Payloads Rising
  • Threat Awareness – Threat Actors Exploiting Microsoft OneNote Attachments to Spread Malware
  • Zscaler Report – OneNote: A Growing Threat for Malware Distribution
  • Threat Awareness – Keep Our Eyes on Emotet
  • Threat Awareness – Emotet Returns After Four Month Break
  • Emotet Employing New Tactics to Evade Detection and Infect more Victims

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar