• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Emotet malware now distributed in Microsoft OneNote files to evade defenses

Lawrence Abrams by Lawrence Abrams
March 18, 2023
Reading Time: 4 mins read
0
Beware: Hackers now use OneNote attachments to spread malware

Phishing emails with malware

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

The Emotet malware is now distributed using Microsoft OneNote email attachments, aiming to bypass Microsoft security restrictions and infect more targets.

Emotet is a notorious malware botnet historically distributed through Microsoft Word and Excel attachments that contain malicious macros. If a user opens the attachment and enables macros, a DLL will be downloaded and executed that installs the Emotet malware on the device.

Once loaded, the malware will steal email contacts and email content for use in future spam campaigns. It will also download other payloads that provide initial access to the corporate network.

This access is used to conduct cyberattacks against the company, which could include ransomware attacks, data theft, cyber espionage, and extortion.

While Emotet was one of the most distributed malware in the past, over the past year, it would stop and start in spurts, ultimately taking a break towards the end of 2022.

After three months of inactivity, the Emotet botnet suddenly turned back on, spewing malicious emails worldwide earlier this month.

Buy JNews
ADVERTISEMENT

However, this initial campaign was flawed as it continued to use Word and Excel documents with macros. As Microsoft now automatically blocks macros in downloaded Word and Excel documents, including those attached to emails, this campaign would only infect a few people.

Malicious Emotet Word document used earlier this month
Malicious Emotet Word document used earlier this month
Source: BleepingComputer

Due to this, BleepingComputer predicted that Emotet would switch to Microsoft OneNote files, which have become a popular method for distributing malware after Microsoft began blocking macros.

Emotetย switches to Microsoft OneNote

As predicted, in an Emotet spam campaignย first spottedย by security researcherย abel, the threat actors have now begun distributing the Emotet malware using malicious Microsoft OneNote attachments.

These attachments are distributed in reply-chain emails that impersonate guides, how-tos, invoices, job references, and more.

Emotet spam email
Emotet spam email
Source: BleepingComputer

Attached to the email are Microsoft OneNote documents that display a message stating that the document is protected. It then prompts you to double-click the ‘View’ button to display the document properly.

Malicious Microsoft OneNote attachment
Malicious Microsoft OneNote attachment
Source: BleepingComputer

Microsoft OneNote allows you to create documents that contain design elements that overlay an embedded document. However, when you double-click on the location where the embedded file is located, even if there is a design element over it, the file will be launched.

In this Emotet malware campaign, the threat actors have hidden a malicious VBScript file called ‘click.wsf’ underneath the “View” button, as shown below.

Hidden click.wsf file in the Microsoft OneNote document
Hidden click.wsf file in the Microsoft OneNote document
Source: BleepingComputer

This VBScript contains a heavily obfuscated script that downloads a DLL from a remote, likely compromised, website and then executes it.

Maliciousย click.wsfโ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹ VBScript file
Maliciousย click.wsf VBScript file
Source: BleepingComputer

While Microsoft OneNote will display a warning when a user attempts to launch an embedded file in OneNote, history has shown us that many users commonly click ‘OK’ buttons to get rid of the alert.

Warning when opening a file embedded in Microsoft OneNoteย 
Warning when opening a file embedded in Microsoft OneNoteย 
Source: BleepingComputer

If the user clicks on the OK button, the embeddedย click.wsf VBScript file will be executed using WScript.exe from OneNote’s Temp folder, which will likely be different for each user:

"%Temp%OneNote16.0Exported{E2124F1B-FFEA-4F6E-AD1C-F70780DF3667}NTclick.wsf" 

The script will then download the Emotet malware as a DLL [VirusTotal] and store it in the same Temp folder. It will then launch the random named DLL using regsvr32.exe.

Emotet will now quietly run on the device, stealing email, contacts, and awaiting further commands from the command and control server.

While it is not known what payloads this campaign ultimately drops, it commonly leads to Cobalt Strike or other malware being installed.

These payloads allow threat actors working with Emotet to gain access to the device and use it as a springboard to spread further in the network.

Blocking malicious Microsoft OneNote documents

Microsoft OneNote has become a massive malware distribution problem, with multiple malware campaigns using these attachments.

Due to this, Microsoft will beย adding improved protections in OneNoteย against phishing documents, but there is no specific timeline for when this will be available to everyone.

However, Windows admins can configure group policies to protect against malicious Microsoft OneNote files.

Admins can use these group policies to either block embedded files in Microsoft OneNote altogether or allow you to specify specific file extensions that should be blocked from running.

All file attachments are blocked in Microsoft OneNote
All file attachments are blocked in Microsoft OneNote
Source: BleepingComputer

You can read more about the available group policiesย in a dedicated articleย BleepingComputer wrote earlier this month.

It is strongly suggested that Windows admins utilize one of these options until Microsoft adds further protections to OneNote.

Share54Tweet34Pin12
Lawrence Abrams

Lawrence Abrams

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

CISA warns of critical ManageEngine RCE bug exploited in attacks

CISA warns of critical ManageEngine RCE bug exploited in attacks

January 23, 2023
Ongoing Flipper Zero phishing attacks target infosec community

Brazil seizing Flipper Zero shipments to prevent use in crime

March 11, 2023
Are XRP whales assembling for a win as Ripple president oozes confidence

Are XRP whales assembling for a win as Ripple president oozes confidence

March 24, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE ยป

Recent Posts

  • Toncoin [TON] climbs into resistance zone, but momentum favored the bulls
  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?