WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness - Use of Microsoft OneNote to Spread Malicious Payloads Rising
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Use of Microsoft OneNote to Spread Malicious Payloads Rising

Author: April Zupan

Created: Thursday, February 9, 2023 - 18:58

Categories: Cybersecurity

SC Magazine has written an article covering the rise of a new malware trend: using Microsoft’s OneNote to distribute payloads. Researchers from both Proofpoint and Sophos have observed various threat actors executing campaigns that deliver malware through OneNote attachments, likely as part of criminals’ continued attempts to test out new methods of bypassing threat detection software. While smaller actors have been observed using this tactic since December 2022, its adoption by the group behind QakBot marks the beginning of its use in “a much more automated, streamlined fashion.” Members should consider increased scrutiny of OneNote files, to the point of blocking the application if it is not used on the organization’s network. Read more at SC Magazine.

Additional WaterISAC Reporting on the OneNote infection vector and/or Qakbot/Qbot:

  • Threat Awareness – Black Basta Ransomware Employs Qakbot in Latest Attack Chain
  • Qbot Displaces Emotet as Most Prevalent Malware in December 2022, New Report Finds
  • Threat Awareness – Threat Actors Exploiting Microsoft OneNote Attachments to Spread Malware
  • Threat Awareness – Qbot Steals Sensitive Data Minutes after the Initial Infection

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar