Attackers don’t need exploits; they need TRUST.
Gen Z, a generation known for prioritizing ease and efficiency, is now entering the cybersecurity landscape on both sides. Some are protecting data, others are stealing it.
With the rise of AI and no-code platforms, building trust and deceiving users has never been easier. Threat actors are blending default-trusted tools with free, legitimate services to bypass traditional security defenses and human suspicions.
All it takes is one compromised internal user, and suddenly, the entire organization is at risk.
OneNOT: How attackers leverage OneNote
Microsoft OneNote, part of the Microsoft 365 suite, is a note-taking application that defenders often overlook.
Unlike Word or Excel, OneNote doesn’t support VBA Macros. However, Varonis Threat Labs has observed its growing use in phishing attacks due to several key factors:
- It is not subject to Protected View
- Its flexible formatting allows attackers to craft deceptive layouts
- It supports embedding malicious files or links
Because OneNote is also a default, trusted application in most organizations, adversaries are increasingly using it as a delivery mechanism, shifting from Macro code to social engineering techniques, so they can bypass security barriers.
One User, OneNote, OneDrive, and many victims

In recent incidents, we’ve seen attackers use a straightforward but highly effective method. After the threat actor gained M365 credentials of one user in an organization through a phishing attack, they created a OneNote file in the compromised user's personal Documents folder on OneDrive, embedding the lure URL for the next phishing stage.


In many phishing attempts, attackers use external email addresses to impersonate Microsoft’s “Someone shared a file with you” notifications. These are often easy for trained users to spot, and even well-crafted versions can be flagged by email security systems through header analysis and sender verification.
In this case, the threat actor took a simpler and more effective route. Instead of spoofing, they used OneDrive’s built-in file-sharing feature from the compromised user account.
As a result, hundreds of users across the organization received a legitimate Microsoft email notification, appearing to come directly from a trusted colleague. The email included a secure link to a file hosted in the organization’s OneDrive environment, making it highly convincing and unlikely to trigger any security alerts. In fact, this was the attacker’s way to spread the phishing laterally.

At Varonis, we observed a spike in ‘Folder shared link created’ events from a compromised user and compared them to their past 90 days of activity.


Unlike many phishing campaigns we've seen in the wild, this one had an unusually high success rate. Many users clicked the link and willingly entered their credentials. After clicking, victims were redirected to a fake login page that looked nearly identical to the company’s real authentication portal.
The phishing site was built using a platform called Flazio, and yes, you guessed it right, it’s a free, AI-powered website builder. This made it incredibly easy for the attacker to spin up a convincing replica of the login page in no time.
Below, you can see a side-by-side comparison of the legitimate login page and the phishing version. The resemblance is disturbingly close.


Recently, we’ve seen a growing trend of phishing campaigns where attackers use free trials of no-code platforms to quickly build customized phishing pages. Just like the fake login page created with Flazio, we’ve also observed threat actors leveraging platforms like ClickFunnels and JotForm.
In several cases, they hosted fake, “Click to view the document” Adobe-style pages that redirected users to phishing login screens designed to steal credentials. These platforms offer an easy, fast, and cost-free way for attackers to create and host phishing pages with minimal effort.


From our perspective, building websites with no-code AI platforms is vibe-coding. For them, it’s vibe-scamming.
What can you do today?
Take these steps to minimize phishing in OneNote:
- Enforce MFA and conditional access for all users to reduce the risk of account takeover if credentials are stolen
- Run regular phishing and vishing simulations, including executives, to build awareness and test real-world responses
- Make it easy to report suspicious activity by ensuring internal reporting channels are clear and accessible
- Review and tighten Microsoft 365 sharing settings to limit unnecessary exposure of internal files
- Set alerts for unusual file sharing behavior and monitor traffic to known no-code site builders
As phishing tactics evolve, so must our defenses. By understanding how attackers exploit trust and leverage modern tools, organizations can better prepare, detect, and respond. In the end, it’s not just about securing systems, it’s about securing people.
What should I do now?
Below are three ways you can continue your journey to reduce data risk at your company:
Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.
See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.
Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.
