Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Attackers Seek New Strategies to Improve Macros' Effectiveness

The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.

The use of malicious macros to infect Windows systems grew significantly in the past year, as attackers found ways to bypass — or convince users to click through — the warnings meant to defend systems. 

The latest scheme to infect computer systems uses an old-school lure: a receipt. Reminiscent of technical-support scams, the recent BazarCall campaign spams out a variety of invoices or receipts that essentially claim the target will be charged tens or hundreds of dollars for a subscription or product and to call a given number if the recipients wants to opt out, says Chester Wisniewski, principal research scientist for anti-malware firm Sophos.

Related Content:

Crime Service Gives Firms Another Reason to Purge Macros

Special Report: Assessing Cybersecurity Risk in Today's Enterprises

New From The Edge: Debating Law Enforcement's Role in the Fight Against Cybercrime

"You then get connected to an Indian call center, where a person directs you to a Web site to download an infected Word document with a macro and talks you through enabling the macros," he says. "And because of that human element, I'm suspecting that they are getting a higher success rate."

Microsoft Office documents with malicious macros — often called "maldocs" — have resurged as a vector to infect systems, growing in the last half of 2020 to account for more than a third of malicious attachments and, at one point in September 2020, accounting for almost 80% of malicious attachments, according to data from Sophos. 

Macros have had a long history of use by attackers, with many early viruses and worms — including the Melissa virus — using Office documents with malicious macros to spread. Both Microsoft Word documents and Excel spreadsheets are equally popular among attackers, and modern cybercrime services allow attackers to easily create maldocs. Some macros even allow attacks on the MacOS

Old tricks still work as well, such as the hard-coded password "VelvetSweatshop" that allows malicious Excel spreadsheets to be encrypted so they can bypass many antivirus engines. 

"As endpoint protection tools get better at identifying these more modern exploits, which usually involve a script that has been embedded into the document, maldoc creators seem to have dug deep to find a very, very old bug that helps conceal the macros or other malicious content in the documents," Sophos states in its latest threat report

The obvious solution is to do away with executable content in documents — a simple way of reducing the attack surface area of your typical office worker. However, macros are still widely used in many business environments, Wisniewski says.

"If you asked me a few years ago [whether we need macros], I would have said no, but then I said that publicly, and I was quickly corrected by about 10,000 people who rely on macros, apparently," he says. "Given that I don't do any 'real work,' which is what I was told at the time by people who use macros, I don't have a need for my Excel to dynamically pull content from a SQL database to update my spreadsheet with the latest sales numbers."

Plenty of workers do, and many companies rely on macros — and specifically Microsoft Office macros.

That makes attempting to limit the use of macros impractical, says Kilian Englert, technical manager at cybersecurity firm Varonis.

"It would be great if we could say, 'No macros at all, ever,' but practically speaking there are a lot of use cases where disabling them outright is tough," he says. "Microsoft is nice and they give you the warning on there, asking if you want to do this, so it comes down to how good is the social engineering."

Signed macros can help but require a more mature IT security team, he adds.

Updating Office will also help minimize the surface area, but while many companies and computer users update Microsoft Windows every month on Patch Tuesday, often Office remains unpatched for longer periods.

Overall, security awareness training may be the best way to harden the workforce against running macros. Microsoft has already added warnings by default to any attempt to run unsigned macros, but users can still accept macros and run them. 

Unfortunately, attackers are getting better at social engineering and finding ways to convince users to circumvent security to increase their success rate. The technical-support scam is the latest attempt to turn credulous users into beachheads into networks. 

Yet the simple fact that allowing executable content to hitch a ride with common documents means users will have to be on watch and security firms will have to come up with better solutions, says Varonis's Englert.

"Maybe we could see a shift in the industry or a shift in the use of it. We could really demand an alternative," he says. "Mistakes happen, and we shouldn't ascribe blame to the end user. It is our job as security professionals to give them the best defenses that we can and then have tools to defend them."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20027
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
CVE-2021-32684
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
CVE-2021-34693
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
CVE-2021-27887
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
CVE-2021-27196
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...