Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview OF QAKBOT MALWARE
This week, security professionals are seeing an increase in malware campaigns impacting Microsoft’s OneNote – a note sharing component of Microsoft Teams. The group TA577 or QakBot has been distributing malware to infect systems via OneNote files since January 31, 2023. The malware campaigns have been named QakNote and they are actively making their way through various organizations.
The researchers at Sophos observed two corresponding spam campaigns delivering malicious OneNote attachments embedded with an HTML application. One campaign involves the attackers hijacking existing email threads and sending a “reply-to-all message” to thread participants with an attached malicious OneNote Notebook. The second campaign involves the attackers sending malicious spam emails with an embedded link to a malicious .one file attachment.
Previously, QakBot was known as a banking trojan, but it has since evolved into malware, allowing threat actors to load it on compromised devices to steal data and infect the devices with ransomware. The QakNote campaigns allow operators to embed most file types, such as VBS attachments and LNK files, when creating the malicious OneNote documents. If a target double-clicks on an embedded attachment in a OneNote Notebook, the malicious documents are executed.
The attacker uses social engineering to convince the target of a “call to action”. One way they do this is by persuading the target to click on a fake “Double Click to View File” button, which then runs the embedded HTA attachment file and retrieves the malware payload. Usually, .one file extensions are not sent as attachments; therefore, it is highly recommended that email administrators block all .one file extensions.
File Hashes
URLs
Dropped Files
Email Attachment Filename
Important Note: Windows Defender detects the .one file as Trojan:JS/Obfuse[.]PRBF!MTB
SUPPORTING DOCUMENTATION
Qakbot mechanizes distribution of malicious OneNote notebooks - AlienVault - Open Threat Exchange
Qakbot mechanizes distribution of malicious OneNote notebooks – Sophos News
QakNote Campaign Leverages OneNote to Infect Victims with QBot | Cyware Alerts - Hacker News
New QakNote attacks push QBot malware via Microsoft OneNote files (bleepingcomputer.com)
Attackers increasingly use Microsoft’s OneNote to deliver QakBot malware | SC Media (scmagazine.com)