WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Threat Actors Exploiting Microsoft OneNote Attachments to Spread Malware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Threat Actors Exploiting Microsoft OneNote Attachments to Spread Malware

Author: Alec Davison

Created: Tuesday, January 24, 2023 - 19:36

Categories: Cybersecurity

Attackers are now exploiting Microsoft OneNote attachments in phishing emails to compromise users with remote access malware, which are likely to be used to deliver additional malware, steal credentials, and other financial information.

Last year, after Microsoft blocked macros sourced from the internet by default, threat actors began to experiment with new file formats for infecting victims. Since Microsoft OneNote is installed by default in all Microsoft Office/365 installations, even if a Windows user does not use the application, it is still available to open the file format. As such, since mid-December, security researchers have observed threat actors disseminating malicious spam emails with OneNote attachments. Phishing emails seen by researchers purported to be DHL shipping notifications urging the user to interact with the OneNote attachment. Attackers are exploiting this feature by attaching malicious VBS attachments that automatically launch the script when double-clicked to download malware from a remote site and install it. To obfuscate this, the threat actors overlay a big ‘Double click to view file’ bar over the inserted attachments to hide them. After user interaction, the OneNote files deliver remote access trojans that include information-stealing capabilities. Since this threat spreads via email, one of the best prevention methods is to regularly remind users to be extra vigilant for suspicious emails and to verify attachments with senders before opening. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar