Macro malware made a comeback late last year. Then, in February of this year, researchers discovered a Neutrino bot dropper that uses Visual Basic for Applications (VBA) macros to deliver its malicious payload. IBM Managed Security Services found even more notable activity associated with macro malware in the last two months. This activity is interesting because, as Dynamoo’s Blog reported, the attachment is a variant of Locky ransomware.

VBA Malware Attack Origins

The top 50 VBA malware-sending IPs — of literally thousands of malicious IPs — are those with the largest number of targets. These are broken down into 15 VBA spam malware-sending countries.

The country with the greatest number of malicious IPs in the top 50 is Turkey, with 13. India is in second place with nine malicious IPs. These findings come as no surprise: As of Sept. 6, 2016, these countries held eighth and fourth place, respectively, in list of top 10 countries with outgoing malicious internet activity, according to Country IP Blocks.

The IP most active in sending VBA spam malware, in terms of both the greatest number of targets and security events, is 103.255.5.117. It’s located in Pakistan, which topped Microsoft’s “Malware Infection Index 2016.” IBM X-Force Exchange assigned the IP a risk rating of 10, the highest level of risk.

Infected machines, or bots, are often used to relay spam. This may or may not be the case with this particular IP, but it is interesting that seven of the VBA spam malware countries below were also among the most vulnerable to malware threats. All IPs in the top 50 currently have a risk rating of 10.


Top origins of VBA malware based on top 50 IPs (July 1, 2016, to Sept. 6, 2016). Source: IBM Managed Security Services.

Gone Phishing

Although the “from” field has a few variations, the majority of the malicious spam email observed by IBM MSS appeared to come from two different emails: [email protected] and [email protected] The malware spam had a DOCM file attached. The file names also varied greatly from email to email.

Per usual, the initial attack vector is a phishing email. Its parting gift, if it’s successful? Ransomware.

Reel In Phishing Attempts

Educating employees about phishing and its associated risks continues to be paramount. A variety of approaches can be used, including videos, online phishing tests, webinars and in-person instruction. Employers should require training at regular intervals.

Employee education should include these main points:

  • Most companies, banks and agencies never request personal information via email. Don’t fall prey to this most common type of phishing.
  • If you suspect an email might be a spear phishing campaign within your company, report it.
  • Immediately suspect emails with generic greetings, like “Dear Customer,” or spelling and grammatical errors.
  • Never reveal personal or financial information in response to an email request, no matter who appears to have sent it.

Education is important, but cannot stand alone. Network protection backed by comprehensive global threat intelligence is key.

The aforementioned VBA malware attack attempts were detected by IBM signatures. These signatures look for suspicious VBA macros within a document. Ensure signatures that detect VBA malware are enabled in your environment.

Ransomware Response

The phish got past your educated user. It got past your network defense. Now, you need to be prepared to respond to the ransomware infection.

IBM recently published its “Ransomware Response Guide,” which prepares an organization for the types of events and incidents it is likely to encounter. It also provides guidance once an incident has occurred, including analysis, containment, eradication, recovery and post-incident activity.

The moral of the story: Don’t trust email attachments, even if they come from a trusted source. Unless you’re expecting an email with a document attached, call the sender and confirm its legitimacy. The computer might have been compromised and commandeered to send emails without senders’ knowledge, or their email addresses could have been spoofed.

Download the complete Ransomware Response Guide from IBM Incident Response Services

More from Malware

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…