May 12, 2015 By Shane Schick 2 min read

Opening spam email messages or the suspicious attachments they often contain are huge risks, but the real danger may be in enabling malicious macros hidden in documents, a security researcher recently warned.

According to Bart Blaze, who published the findings on his own Blaze’s Security Blog, the kind of spam used by cybercriminals to steal data or take over computers is becoming more complex and deadlier than ever. Hackers might send a phony bill, for example, which includes a document written in Microsoft Word. Although potentially malicious macros are usually disabled by default, those who allow them after being prompted to do so might suddenly find themselves presented with a distraction while malware infects their machine.

This kind of attack can be nearly invisible to the average user since the attackers in question are using formats that save Web page content along with animations, applets and so on, SecurityWeek.Com reported. That means what seems like an innocent document could be packed with a Trojan downloader and other components that malicious macros set free. The malware that raises the most concern is, in all likelihood, those that target financial institutions and their customers. SecurityWeek.Com suggested that in this case, the payload may have been the banking Trojan Dyre.

Microsoft is well aware that malicious macros are making a comeback of sorts among cybercriminals. In a recently released report from its Malware Protection Center, the company said it has seen more than half a million such attacks, primarily within North America and the U.K. Although the social engineering aspects of these hacker attempts cannot be ignored — the bad guys have gotten pretty good at putting what look like important documents in spam messages — there are other tricks being added to the mix.

BankInfoSecurity suggested more cybercriminals are using the PowerShell scripting language to create the macros, and they are then putting them in compressed zip files that aren’t as easily detected by common security software. Even if there are fewer hackers using these techniques than there would have been in the ’90s, they might be much more focused and effective in carrying them out today.

It’s also important to note that Microsoft documents aren’t the only vehicle for malicious macros. V3.co.uk reported there has been a spam campaign spreading the harmful Bartalex malware using macros within Dropbox. Fair warning: If it’s not immediately easy to open or use certain files, there may be a good reason to leave them alone.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today