Security News > 2022 > February > Microsoft Disables Internet Macros in Office Apps by Default to Block Malware Attacks
Microsoft on Monday said it's taking steps to disable Visual Basic for Applications macros by default across its products, including Word, Excel, PowerPoint, Access, and Visio, for documents downloaded from the web in an attempt to eliminate an entire class of attack vector.
"Bad actors send macros in Office files to end users who unknowingly enable them, malicious payloads are delivered, and the impact can be severe including malware, compromised identity, data loss, and remote access," Kellie Eickmeyer said in a post announcing the move.
While the company does warn users about permitting macros in Office files, unsuspecting users - e.g., recipients of phishing emails - can still be lured into enabling the feature, effectively granting the attackers the ability to gain an initial foothold into the system.
As part of the new change, when a user opens an attachment or downloads from the internet an untrusted Office file containing macros, the app displays a security risk banner stating, "Microsoft has blocked macros from running because the source of the file is untrusted."
"If a downloaded file from the internet wants you to allow macros, and you're not certain what those macros do, you should probably just delete that file," Microsoft cautions, outlining the security risk of bad actors using macros.
The updates are expected to be applied to Microsoft 365 users in April 2022, with plans to backport the feature to Office LTSC, Office 2021, Office 2019, Office 2016, and Office 2013 at a "Future date."
News URL
https://thehackernews.com/2022/02/microsoft-disables-internet-macros-in.html
Related news
- Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware (source)
- Microsoft discloses Office zero-day, still working on a patch (source)
- Microsoft discloses unpatched Office flaw that exposes NTLM hashes (source)
- Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure (source)
- Microsoft fixes 6 zero-days under active attack (source)
- Microsoft: Exchange Online mistakenly tags emails as malware (source)
- Microsoft mistake blows up admins' inboxes with fake malware alerts (source)
- South Korean hackers exploited WPS Office zero-day to deploy malware (source)
- Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack (source)
- New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm (source)