Microsoft OneNote

How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…

Read more
Malicious-One-Note-Files-Insta

Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks.

As of Februrary 2023, numerous instances of malicious Microsoft OneNote files (.one) have been detected and stopped from being used to obtain intial access to victims by BlackpointCyber's SOC with…

Read more