Take it Easy: How Microsoft OneNote Phishing is on the Rise

Discover how attackers use OneNote, OneDrive, and no-code tools like Flazio for phishing, and practical steps to defend your organization today.
3 min read
Last updated July 2, 2025

Attackers don’t need exploits; they need TRUST.  

Gen Z, a generation known for prioritizing ease and efficiency, is now entering the cybersecurity landscape on both sides. Some are protecting data, others are stealing it. 

With the rise of AI and no-code platforms, building trust and deceiving users has never been easier. Threat actors are blending default-trusted tools with free, legitimate services to bypass traditional security defenses and human suspicions. 

All it takes is one compromised internal user, and suddenly, the entire organization is at risk. 

OneNOT: How attackers leverage OneNote

Microsoft OneNote, part of the Microsoft 365 suite, is a note-taking application that defenders often overlook.  

Unlike Word or Excel, OneNote doesn’t support VBA Macros. However, Varonis Threat Labs has observed its growing use in phishing attacks due to several key factors

  • It is not subject to Protected View 
  • Its flexible formatting allows attackers to craft deceptive layouts 
  • It supports embedding malicious files or links 

Because OneNote is also a default, trusted application in most organizations, adversaries are increasingly using it as a delivery mechanism, shifting from Macro code to social engineering techniques, so they can bypass security barriers

One User, OneNote, OneDrive, and many victims 

Diagram

In recent incidents, we’ve seen attackers use a straightforward but highly effective method. After the threat actor gained M365 credentials of one user in an organization through a phishing attack, they created a OneNote file in the compromised user's personal Documents folder on OneDrive, embedding the lure URL for the next phishing stage. 

Phishy file read and file uploaded notifications.
Blog_VTL-TakeitEasy_202506_Img2
Phishy file read and file uploaded notifications.
OneNote file in the compromised user's personal Documents folder on OneDrive.
Blog_VTL-TakeitEasy_202506_Img1
OneNote file in the compromised user's personal Documents folder on OneDrive.

In many phishing attempts, attackers use external email addresses to impersonate Microsoft’s “Someone shared a file with you” notifications. These are often easy for trained users to spot, and even well-crafted versions can be flagged by email security systems through header analysis and sender verification. 

In this case, the threat actor took a simpler and more effective route. Instead of spoofing, they used OneDrive’s built-in file-sharing feature from the compromised user account.  

As a result, hundreds of users across the organization received a legitimate Microsoft email notification, appearing to come directly from a trusted colleague. The email included a secure link to a file hosted in the organization’s OneDrive environment, making it highly convincing and unlikely to trigger any security alerts. In fact, this was the attacker’s way to spread the phishing laterally. 

A phony “Someone shared a file with you” notification.
Blog_VTL-TakeitEasy_202506_Img8
A phony “Someone shared a file with you” notification.

At Varonis, we observed a spike in ‘Folder shared link created’ events from a compromised user and compared them to their past 90 days of activity.  

Unusual 'Folder shared link created' events.
Blog_VTL-TakeitEasy_202506_Img3
Unusual 'Folder shared link created' events.
Blog_VTL-TakeitEasy_202506_Img5

Unlike many phishing campaigns we've seen in the wild, this one had an unusually high success rate. Many users clicked the link and willingly entered their credentials. After clicking, victims were redirected to a fake login page that looked nearly identical to the company’s real authentication portal. 

The phishing site was built using a platform called Flazio, and yes, you guessed it right, it’s a free, AI-powered website builder. This made it incredibly easy for the attacker to spin up a convincing replica of the login page in no time. 

Below, you can see a side-by-side comparison of the legitimate login page and the phishing version. The resemblance is disturbingly close. 

The real company authentication portal.
Blog_VTL-TakeitEasy_202506_Img7
The real company authentication portal.
The phishing site mimicking the original portal.
Blog_VTL-TakeitEasy_202506_Img6
The phishing site mimicking the original portal.

 

Recently, we’ve seen a growing trend of phishing campaigns where attackers use free trials of no-code platforms to quickly build customized phishing pages. Just like the fake login page created with Flazio, we’ve also observed threat actors leveraging platforms like ClickFunnels and JotForm

In several cases, they hosted fake, “Click to view the document” Adobe-style pages that redirected users to phishing login screens designed to steal credentials. These platforms offer an easy, fast, and cost-free way for attackers to create and host phishing pages with minimal effort. 

Phishing page created in Jotform.
AdobeSignIn
Phishing page created in Jotform.
Phishing page created with ClickFunnels.
Blog_VTL-TakeitEasy_202506_Img9
Phishing page created with ClickFunnels.

 

From our perspective, building websites with no-code AI platforms is vibe-coding. For them, it’s vibe-scamming

What can you do today? 

Take these steps to minimize phishing in OneNote: 

  • Enforce MFA and conditional access for all users to reduce the risk of account takeover if credentials are stolen 
  • Run regular phishing and vishing simulations, including executives, to build awareness and test real-world responses 
  • Make it easy to report suspicious activity by ensuring internal reporting channels are clear and accessible 
  • Review and tighten Microsoft 365 sharing settings to limit unnecessary exposure of internal files 
  • Set alerts for unusual file sharing behavior and monitor traffic to known no-code site builders 

As phishing tactics evolve, so must our defenses. By understanding how attackers exploit trust and leverage modern tools, organizations can better prepare, detect, and respond. In the end, it’s not just about securing systems, it’s about securing people. 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

ongoing-campaign-abuses-microsoft-365’s-direct-send-to-deliver-phishing-emails
Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails
Varonis Threat Labs uncovered a phishing campaign with M365's Direct Send feature that spoofs internal users without ever needing to compromise an account.
why-kerberoasting-still-matters-for-security-teams 
Why Kerberoasting Still Matters for Security Teams 
Sometimes the old ones are best... avoided. Explore Kerberoasting and how it remains a relevant attack method.
the-jitter-trap:-how-randomness-betrays-the-evasive
The Jitter-Trap: How Randomness Betrays the Evasive
Discover how Varonis researchers detect stealthy beacon traffic by analyzing jitter patterns, turning evasion tactics into powerful behavioral detection signals.