Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used to install further malware, steal passwords, or even cryptocurrency ...
A recent phishing campaign used OneNote to distribute the Agent Tesla keylogger. A phishing campaign was recently discovered leveraging OneNote, Microsoft’s digital notebook that automatically saves ...