techwithmuchiri
Advertisement
  • Home
  • Reviews
  • Smartphones
    • Android
    • Apple
  • HOW TO
  • Tech News
  • Tech Explained
  • OPINIONS
  • ENTERTAINMENT
No Result
View All Result
  • Home
  • Reviews
  • Smartphones
    • Android
    • Apple
  • HOW TO
  • Tech News
  • Tech Explained
  • OPINIONS
  • ENTERTAINMENT
No Result
View All Result
techwithmuchiri
Home PCs, Laptops and iMacs

Hackers Are Now Spreading Malware Via Microsoft OneNote Attachments.

Muchiri by Muchiri
January 28, 2023
in PCs, Laptops and iMacs, Tech News
0
Microsoft OneNote
Share on FacebookShare on Twitter

Word and Excel were once hackers’ favorite apps for distributing malicious software to duped victims who were tricked into downloading email attachments, but Microsoft blocked the exploit in July.

But it seems that hackers have found another Microsoft platform to distribute malware.

According to BleepingComputer, threat actors are now using Microsoft OneNote to remotely control victims’ PCs, allowing them to install more malware, breach cryptocurrency wallets, steal passwords and even take screenshots and access your webcam.

How Hackers Are Using Microsoft OneNote To Wreak Havoc On PCs

On the plus side, in order to be a victim of a OneNote-propelled attack, you’d need to fall for a phishing email campaign.

And we’d hope that the egregious spelling errors, suspicious-looking email address, and poor mimicking of an official company would deter you from falling for it, but alas, hackers seem to snag a few victims into its web nonetheless.

During BleepingComputer’s investigation, it found that cybercriminals masked their ill-intentioned, malware-infested emails as official DHL correspondence.

The emails attempted to fool recipients into thinking they were getting DHL invoices, shipping documents, notifications, and more.

Microsoft OneNote
Image source: BleepingComputer

Once a victim clicks on the OneNote attachment, the information is blurred. There’s an overlay that says, “Double Click to View File.” If the quarry follows the instruction, chaos ensues.

Microsoft OneNote
Image source: BleepingComputer

According to BlleingComputer, threat actors are attaching malicious VBS attachments that automatically launch the script when double-clicked to download malware from a remote site and install it.

Remote-access trojans will then take over the computer, allowing hackers to steal victims’ files. breach cryptocurrency wallets, and snatch browser passwords. In some cases, cybercriminals can even take screenshots and take control of users’ webcams.

How To Protect Yourself

Good news! If you attempt to download a malicious attachment, according to BleepingComputer, you should get a warning from Windows informing you that the document may be harmful.

However, users often ignore this pop-up message and download it anyway, don’t be that person.

Image source: BleepingComputer

But you shouldn’t get that far, really, because you should refrain from opening emails and attachments from unknown sources. Plus, phishing emails are typically easy to spot.

As mentioned, poor grammar, spelling errors, waywardly placed logos, and other fishy elements should make spotting malicious emails a piece of cake.

If you feel it may be a legitimate email, share it with a security or Windows admin to help you verify if the file is safe

Join us on Telegram
Previous Post

How To Disable Control Center On A Locked iPhone

Next Post

Microsoft’s Xbox Consoles Are Now The First Consoles To Become Carbon Aware

Muchiri

Muchiri

Working on my bio. Check again after ten years.

Next Post
Xbox

Microsoft's Xbox Consoles Are Now The First Consoles To Become Carbon Aware

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

TechSpot Africa – The Podcast

TechSpot Africa
TechSpot Africa

Listen to the latest insights in the tech space on the TechSpot Africa Podcast, hosted by Nigel Jr. from tech-space.africa and Antony Muchiri of techwithmuchiri.com. Stay ahead in the tech game, tune in now! Subscribe and share!

Listen OnSpotify
Kenyan Labour is Cheap, Twitter's 2FA Charge, Facebook's Paid Verification, OPPO Reno8 T Pricing, and More!
byTechspot Africa

In this episode we talk about Twitter charging for 2FA, Facebook adopting paid verification, Youtube CEO stepping down, Youtube shorts the OPPO Reno8 T Pricing and More!

Kenyan Labour is Cheap, Twitter's 2FA Charge, Facebook's Paid Verification, OPPO Reno8 T Pricing, and More!
Kenyan Labour is Cheap, Twitter's 2FA Charge, Facebook's Paid Verification, OPPO Reno8 T Pricing, and More!
February 21, 2023
Techspot Africa
Google Bard is the ChatGPT Killer? Samsung S23 Pricing in Kenya is Weird and OPPO Reno8t First Impressions
February 7, 2023
Techspot Africa
Search Results placeholder

Recommended

OPPO Reno 8T 5G Unboxing and First Impressions 

OPPO Reno8 T 5G Review: The Design King!

February 19, 2023
Xiaomi 13 series

Xiaomi 13 Series Launched: Here’s Everything You Need To Know

December 12, 2022

Most Popular

Twitter Set To ‘Sunset’ Original Blue Badge Verification In A Few Months
Featured

Twitter Blue Subscription Rolled Out Globally: Here Are The Kenyan Prices

March 25, 2023
Google
How To

How To Access Google Bard

March 22, 2023
Microsoft To Launch ChatGPT-4 Next Week
Tech News

ChatGPT Chat History Temporarily Disabled: Here’s Why

March 21, 2023
  • About Us
  • Contact Us
  • Privacy Policy
Email us: [email protected]

© 2023 Tech With Muchiri

No Result
View All Result
  • Home
  • Reviews
  • Smartphones
    • Android
    • Apple
  • HOW TO
  • Tech News
  • Tech Explained
  • OPINIONS
  • ENTERTAINMENT

© 2023 Tech With Muchiri

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT