{"id":156449,"date":"2023-01-27T23:23:52","date_gmt":"2023-01-28T05:23:52","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/01\/after-google-docs-hackers-turn-to-microsoft-onenote-to-target-users-with-malware"},"modified":"2023-01-27T23:23:52","modified_gmt":"2023-01-28T05:23:52","slug":"after-google-docs-hackers-turn-to-microsoft-onenote-to-target-users-with-malware","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/01\/after-google-docs-hackers-turn-to-microsoft-onenote-to-target-users-with-malware","title":{"rendered":"After Google Docs, hackers turn to Microsoft OneNote to target users with malware"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/after-google-docs-hackers-turn-to-microsoft-onenote-to-target-users-with-malware.jpg\"><\/a><\/p>\n<p>Cyber attackers around the world are looking at alternate file attachment types to trap users with phishing and malware attacks, according to a report by Bleeping Computer. The alternate attachment types come in the form of online, open-source file attachments, and the latest type that has now been spotted includes Microsoft OneNote files. According to the report, hackers are exploiting OneNote attachments in emails to trick users into downloading malware.<\/p>\n<p>The report stated that hackers switched to OneNote, Microsoft\u2019s online note-taking alternative to Word, after the company disabled \u2018macros\u2019 by default in email attachments. The latter, which refer to code snippets that execute a command upon a user opening the email attachment, were long since used by attackers to get users to download malware attachments.<\/p>\n<p>By using macros, hackers would store malware within Microsoft Word or Excel documents. Once a user opened the attachment, the malware would get triggered automatically. These malware, in turn, could be used for a wide range of attacks \u2014 including remote code execution, botnets, financial or identity theft, or even spyware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attackers around the world are looking at alternate file attachment types to trap users with phishing and malware attacks, according to a report by Bleeping Computer. The alternate attachment types come in the form of online, open-source file attachments, and the latest type that has now been spotted includes Microsoft OneNote files. According to [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,45],"tags":[],"class_list":["post-156449","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-finance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/156449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=156449"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/156449\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=156449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=156449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=156449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}