How Threat Actors Use OneNote to Deploy ASyncRAT

1 · trustedsec · Feb. 1, 2023, 3:45 p.m.
See how Research Team Lead Carlos Perez dissects a sample of a OneNote document that was used to deploy ASyncRAT, an open-source remote admin tool, to enable phishing attacks. You’ll find out how these OneNote files are now being used by threat actors and where to find the location that ASyncRAT is being downloaded and... The post How Threat Actors Use OneNote to Deploy ASyncRAT appeared first on TrustedSec....