Headlines

The Rise of Macro-less Malware: How Cybercriminals Have Found a Way Around Microsoft’s Macro Blocking.

The Rise of Macro-less Malware: How Cybercriminals Have Found a Way Around Microsoft's Macro Blocking.malware,cybercriminals,Microsoft,macroblocking,security

Microsoft Macroblocking and the Evolution of Malware Delivery

Ever since Microsoft made a policy change by blocking Office macros by default, cybercriminals have been forced to evolve and find new ways of delivering malware. For a long time, attackers used malicious Microsoft Office macros to gain access to their target’s computers. This prompted Microsoft to block macros by default on files downloaded from the Internet starting in 2022. This policy change significantly decreased macro-enabled attacks, leading cybercriminals to find new methods for delivering malware.

How Attackers Have Adjusted

Threat actors have been searching for a new delivery method for their malware. When macros were blocked, hackers started using “container files” as an alternative. However, Microsoft addressed this workaround, and hackers moved on to other options. For instance, in the latter half of 2022, HTML smuggling became popular. Attackers would slip an encoded script through an HTML attachment instead. In 2023, we saw a rise in the use of PDFs as a popular file format among attackers. Recently, malicious campaigns have been observed utilizing Microsoft‘s OneNote app to deliver their malware. Over 120 campaigns have made use of OneNote to date, but none of them have the same durability as macro-enabled attachments.

What This Means for Security Teams

The policy change has made a big difference in the cybercrime landscape. Attackers are now forced to be more creative, which presents more opportunities for them to make mistakes. Cyber defenders must move equally as fast to keep up. They must also come up with new detections and rules to prevent threat actors from bypassing existing detections. Organizations need to keep up-to-date with the latest trends and incorporate new potential threats into security training. However, from an overall, holistic security viewpoint, there’s nothing that needs to drastically change as long as users are aware of the new methods for delivering malware.

Conclusion

Microsoft‘s policy change of blocking macros by default has drastically decreased macro-enabled attacks. Though, it has forced cybercriminals to find new methods of delivering malware. Their efforts have been unique and fast-paced. Cyber defenders and organizations must keep up-to-date with the latest trends and incorporate new potential threats into security training to stay ahead of the game.

Malware, Cybercrime, Security, Technology.-malware,cybercriminals,Microsoft,macroblocking,security


The Rise of Macro-less Malware: How Cybercriminals Have Found a Way Around Microsoft
<< photo by Brett Sayles >>

You might want to read !