{"id":4308,"date":"2023-01-22T20:58:05","date_gmt":"2023-01-22T19:58:05","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=4308"},"modified":"2023-01-22T20:58:05","modified_gmt":"2023-01-22T19:58:05","slug":"napadaci-koriste-onenote-za-sirenje-zlonamjernog-softvera","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/01\/22\/napadaci-koriste-onenote-za-sirenje-zlonamjernog-softvera\/","title":{"rendered":"Napada\u010di koriste OneNote za \u0161irenje zlonamjernog softvera"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Napada\u010di sada koriste <em>OneNote<\/em> za \u0161irenje <a href=\"https:\/\/sajberinfo.com\/en\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjernog softvera<\/a> kroz <a href=\"https:\/\/sajberinfo.com\/en\/2022\/01\/02\/phishing-meta-su-ljudi-ne-tehnologija\/\" target=\"_blank\" rel=\"nofollow noopener\">pecanja korisnika preko elektronske po\u0161te<\/a> (eng. <em>phishing<\/em>). Napada\u010di ovim putem \u0161ire zlonamjerni softver za daljinsku kontrolu koji im omogu\u0107ava instalaciju drugih zlonamjernih softvera, kra\u0111u korisni\u010dkih lozinki i kra\u0111u kripto nov\u010danika.<\/span><\/p>\n<div id=\"attachment_4311\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4311\" class=\"size-full wp-image-4311\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-attack.jpg\" alt=\"OneNote napad\" width=\"1024\" height=\"649\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-attack.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-attack-300x190.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-attack-768x487.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-attack-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-4311\" class=\"wp-caption-text\"><em>Napada\u010di koriste OneNote za \u0161irenje zlonamjernog softvera; Dizajn: Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<h2><strong><span style=\"font-size: 14pt;\">Pogled unazad<\/span><\/strong><\/h2>\n<p><span style=\"font-size: 14pt;\">Napada\u010di su do sada vr\u0161ili distribuciju <em>Word<\/em> i<em> Excel<\/em> dokumenata preko elektronske po\u0161te koriste\u0107i <em>macro<\/em> skripte za preuzimanje i instalaciju zlonamjernog softvera bez znanja korisnika. Kompanija <em>Microsoft<\/em> je, pro\u0161le godine u julu, onemogu\u0107ila podrazumijevano kori\u0161tenje <em>macro<\/em> skripti u <em>Office<\/em> dokumentima, pa je distribucija zlonamjernog softvera kori\u0161tenjem ovih dokumenta postala nepouzdana za napada\u010de.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Napada\u010di su ubrzo pre\u0161li na nove formate datoteka, kao \u0161to su <em>ISO<\/em> datoteke i <em>ZIP<\/em> arhive za\u0161ti\u0107ene lozinkama. Ovi formati su postali izuzetno popularni za napade na korisnike zbog gre\u0161ke u <em>Windows<\/em> operativnom sistemu koja je dozvoljavala <em>ISO<\/em> datotekama da zaobi\u0111u sigurnosno upozorenje, a popularni <em>7-Zip<\/em> program za arhiviranje nije nametao sigurnosni mehanizam \u201cpreuzeto sa Interneta\u201d (eng. <em>mark-of-the-web<\/em>) na dokumente raspakovane iz arhive.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Svjesni opasnosti po korisnike, <em>7-Zip<\/em> i <em>Windows<\/em> su ispravili ovaj propust, \u0161to za posljedicu ima da prikazivanje prozora sa upozorenjem kada korisnik poku\u0161a otvoriti dokumente preuzet sa Interneta unutar <em>ISO<\/em> datoteke i <em>ZIP<\/em> arhive.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Napada\u010di su uporni i nikada ne odustaju, pa su ubrzo prona\u0161li novo rije\u0161enje u vidu <em>Microsoft OneNote<\/em> priloga u elektronskoj po\u0161ti.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong><em>OneNote<\/em> zloupotreba <\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\"><em>Microsoft OneNote<\/em> je besplatna aplikacija dizajnirana kao digitalna bilje\u017enica koja se mo\u017ee preuzeti samostalno, a dolazi u sklopu <em>Microsoft Office 2019<\/em> i <em>Microsoft Office 365.<\/em><\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Prilikom podrazumijevane instalacije <em>Office<\/em> paketa, <em>OneNote<\/em> \u0107e biti instaliran bez obzira da li ga korisnik koristi i dostupan za otvaranje dokumenata. Sada su sigurnosni istra\u017eiva\u010di polovinom decembra pro\u0161le godine <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/trojanized-onenote-document-leads-to-formbook-malware\/\" target=\"_blank\" rel=\"noopener\">otkrili da se <em>OneNote<\/em> dokumenti zloupotrebljavaju<\/a> za \u0161irenje zlonamjernog softvera.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Za razliku od <em>Word<\/em> i <em>Excel<\/em> dokumenata, <em>OneNote<\/em> ne podr\u017eava <em>macro<\/em> skripte koje su napada\u010di prije zloupotrebljavali. Umjesto toga, napada\u010di zloupotrebljavaju mogu\u0107nost <em>OneNote<\/em> dokumenta da se u njega ubaci prilog koji se mo\u017ee otvoriti dvostrukim klikom. Napada\u010di sada ubacuju u <em>OneNote<\/em> dokumente <em>VBS<\/em> priloge, koji kada se pokrenu automatski preuzimaju zlonamjerni softver sa udaljene lokacije instaliraju na korisni\u010dki ure\u0111aj.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Napada\u010di su vje\u0161to \u201cprekrili\u201d navodno prilo\u017eene dokumente dugmetom \u201c<em>Double click to view file<\/em>\u201d koje je ustvari <em>VBS<\/em> dodatak.<\/span><\/p>\n<div id=\"attachment_4313\" style=\"width: 1419px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4313\" class=\"size-full wp-image-4313\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment.webp\" alt=\"Malicious OneNote Email Attachment\" width=\"1409\" height=\"800\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment.webp 1409w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment-300x170.webp 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment-1024x581.webp 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment-768x436.webp 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/Malicious-OneNote-Email-Attachment-18x10.webp 18w\" sizes=\"auto, (max-width: 1409px) 100vw, 1409px\" \/><p id=\"caption-attachment-4313\" class=\"wp-caption-text\"><em>Malicious OneNote Email Attachment; Source: <\/em><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-use-microsoft-onenote-attachments-to-spread-malware\/\" target=\"_blank\" rel=\"noopener\"><em>BleepingComputer<\/em><\/a><\/p><\/div>\n<p><span style=\"font-size: 14pt;\">Naravno, kada korisnik pokrene <em>OneNote <\/em>prilog, dobija upozorenje da pokretanjem istog mogu ugroziti svoju ure\u0111aj i podatke. Me\u0111utim, lekcije iz pro\u0161losti su pokazale da korisnici veoma \u010desto ignori\u0161u ovo upozorenje i jednostavno kliku na \u201c<em>OK\u201d<\/em>.<\/span><\/p>\n<div id=\"attachment_4314\" style=\"width: 852px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4314\" class=\"size-full wp-image-4314\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-Attachment-Safety-Warning.webp\" alt=\"OneNote Attachment Safety Warning\" width=\"842\" height=\"400\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-Attachment-Safety-Warning.webp 842w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-Attachment-Safety-Warning-300x143.webp 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-Attachment-Safety-Warning-768x365.webp 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/01\/OneNote-Attachment-Safety-Warning-18x9.webp 18w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/><p id=\"caption-attachment-4314\" class=\"wp-caption-text\"><em>OneNote attachment security warning Source:<\/em><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-use-microsoft-onenote-attachments-to-spread-malware\/\" target=\"_blank\" rel=\"noopener\"><em> BleepingComputer<\/em><\/a><\/p><\/div>\n<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010di su u svojim analizama prona\u0161li, da nakon ignorisanja upozorenja na opasnost od strane korisnika, dolazi do preuzimanja alata za daljinsku kontrolu (eng. <em>remote access trojan \u2013 RAT<\/em>) koji ima mogu\u0107nost kra\u0111e korisni\u010dkih informacija. Sigurnosni istra\u017eiva\u010di su uspjeli potvrditi da se u posmatranim uzorcima za sada radi o <em>AsyncRAT<\/em> i <em>Xworm<\/em> zlonamjernim softverima.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-size: 14pt;\"><strong>Za\u0161tita korisnika<\/strong><\/span><\/h4>\n<p><span style=\"font-size: 14pt;\">Jednom kada se instalira, zlonamjerni softver \u0107e omogu\u0107iti napada\u010du pristup ure\u0111aju uz mogu\u0107nost kra\u0111e dokumenta, lozinki, pravljenje snimaka ekrana, a u nekim situacijama i snimanje korisnika preko web kamere.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Najbolji na\u010din da se korisnici za\u0161tite je da ne otvaraju priloge elektronske po\u0161te od nepoznatih po\u0161iljalaca. U slu\u010daju ako otvore prilog elektronske po\u0161te, onda je najbolje da ne ignori\u0161u upozorenje operativnog sistema ili aplikacije.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Napada\u010di sada koriste OneNote za \u0161irenje zlonamjernog softvera kroz pecanja korisnika preko elektronske po\u0161te (eng. phishing). Napada\u010di ovim putem \u0161ire zlonamjerni softver za daljinsku kontrolu koji im omogu\u0107ava instalaciju drugih zlonamjernih softvera, kra\u0111u korisni\u010dkih&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":4311,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[93,130,265,61,145,143],"class_list":["post-4308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-malware","tag-microsoft","tag-office","tag-phishing","tag-rat","tag-windows"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=4308"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4308\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/4311"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=4308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=4308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=4308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}