• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

With Microsoft taking action preventing the malicious use of Office macros, the Emotet operators are turning to OneDrive URLs and PowerShell.

April 27, 2022 Zachary Comeau Leave a Comment

3CX Supply Chain Attack
stock.adobe.com/Alexander Limbach

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell.

The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting “thousands of customers with tens of thousands of messages in multiple geographic regions,” with some message volumes reaching over 1 million per campaign, according to cybersecurity firm Proofpoint. However, the newly discovered Emotet activity suggests that the Emotet group is testing new techniques on a smaller scale and in a more selective, targeted nature— a departure from its typical massive scale email campaigns.

According to Proofpoint, the firm detected a low volume of emails distributing the Emotet malware via compromised sender emails not sent by the Emotet spam module. Email subject lines contained one word, such as “Salary” with bodies containing only OneDrive URLs that hosted zip files containing Microsoft Excel Add-in (XLL) files.

In its analysis of the newly discovered campaign, Proofpoint says the zip archives and XLL files used the same lures as the email subject lines, with one archive containing four copies of the same XLL file with names such as “ “Salary_and_bonuses-04.01.2022.xll.” When those files are executed, they drop and run Emotet, leveraging the Epoch 4 botnet.

The low-volume nature of the activity, the use of OneDrive URLs and XLL files set this campaign apart from historic Emotet campaigns marked by a high volume of emails and Microsoft Office documents containing VBA or XL4 macros.

Microsoft in February announced that it would be disabling VBA macros for Office apps by default to help prevent malware deployments to unwitting end users, covering Access, Excel, PowerPoint, Visio and Word on Windows devices. Those changes began rolling out earlier this month.

With Office macros no longer a reliable distribution vehicle for malware, this new Emotet campaign suggests that threat actors are adapting their techniques and finding new ways to attack victims.

Proofpoint says this low-volume campaign began during a quiet period for Emotet earlier this month, using a break from its high-volume campaigns to test this new attack vector and others.

Also this week, security researchers have discovered another new Emotet attack vector that uses PowerShell in LNK attachments instead of Office macros.

According to Slovakia-based cybersecurity company ESET, if a victim is tricked into downloading and running the attachment, the Emotet binary (.DLL) is downloaded and executed.

#BREAKING Another day at #ESETresearch, another #Emotet campaign with a new technique. Instead of the usual Office macros, operators use PowerShell in LNK attachments – filename “form.lnk”. If the victim runs the file, Emotet binary (.DLL) is downloaded and executed. 1/4 pic.twitter.com/iLzFl5t8M5

— ESET research (@ESETresearch) April 26, 2022

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Botnet, Cybersecurity, Emotet, ESET, macros, Malware, OneDrive, PowerShell, Proofpoint

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.