Linchakin

Hackers Use New Tactics To Spread Malware as Microsoft Blocked Macros by Default

 August 01, 2022     No comments   

Hackers Use New Tactics as Microsoft Blocked Macros by Default

As Microsoft Office began blocking malicious macros by default in many of its programs, hackers began to change their tactics after they had previously distributed malware via phishing attachments with malicious macros.

The cybersecurity experts at Proofpoint have claimed that it has now become more common for hackers to use new file types such as:- 

  • ISO
  • RAR
  • Windows Shortcut (LNK) attachments

There are several types of macros that can be created in Microsoft Office programs that automate repetitive tasks. These include VBA macros and XL4 macros. While the threat actors use them in a variety of ways, including:-

  • Malware loading
  • Dropping malware
  • Installing malware
EHA

It is because Microsoft announced that they were going to block macros by default on their Office subsystem in order to end the abuse of the subsystem that Microsoft was experiencing.

In this way, the hackers will have a harder time activating them, so the users will be safer. 

Shifting to New Tactics

Compared to the same period last year, macros have been used 66% less, a clear sign that there has been a shift away from macros as a means of distributing payloads.

There is also an increase of almost 175% in the use of container files, which have grown steadily over the past few years. The use of LNK files has been reported by at least 10 different threat actors since February 2022, which is quite a large number.

Since the month of October 2021, there was an increase of 1,675% in the number of campaigns containing LNK files. These new methods have led to the distribution of several notable malware families, including:-

While apart from this, Proofpoint analysts have tracked these events and found that the use of HTML attachments to drop malicious files on the host system has increased significantly in the past year. 

Despite this, they continue to have small distribution volumes despite their growing popularity. It is now becoming more common for threat actors to use a variety of file types in order to gain access to files at the beginning instead of macro-enabled documents. 

LNK files and ISO formats have been adopted due to this change. Microsoft’s macro blocking protection can be bypassed using such filetypes, as well as the distribution of executable files can be simplified.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • UH OHT-Mobile is investigating a reported data breach. It sounds like a bad one.T-Mobile customers may want to brace for some bad news. The mobile service provider is investigating a reported data breach that may have exposed the … Read More
  • ASUS Unveils N5105I-IM-A, Intel Jasper Lake in Mini-ITX Form Back in January, Intel launched its Jasper Lake platform with a range of dual-core and quad-core Tremont Atom-based processors.. Primarily aimed at … Read More
  • A NEW LEAKGoogle Pixel 5a launch date and specs revealed in new leakIt's been a long wait, but Google's Pixel 5a 5G is finally coming. Probably. According to Android Police, who has obtained some new information and ph… Read More
  • Samsung Display Announces Polarizer-less OLED With 25% Less Power Today Samsung Display Company (SDC) is announcing the introduction and mass production of a new generation of OLED panel called “Eco²OLED”. While th… Read More
  • Colorful Launches Two White Mini-ITX Motherboards For Intel Rocket Lake Colorful has unveiled two new motherboards designed for Intel Rocket Lake and Comet Lake processors. The CVN B560I Gaming V20 and CVN B560I Gaming F… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates