I thought macro threats were gone, but now I am reading that they have changed roles and can still be a security...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
headache. How can I stop macro threats and viruses?
Anything that can execute code on a client computer is potentially malicious. Until there are wider efforts to either make a secure shell scripting language like Shill prevalent or add security features to existing scripting languages, enterprises will continue to be challenged by macro viruses and shell scripts.
Simply put, secure shell scripting languages will not stop the development of malicious executables. Using signed shell scripts is a significant step forward, but signed shell scripts can also be used maliciously.
Fortinet Inc. researcher Ruhai Zhang wrote about malware that used an Excel macro as the initial infection vector in a multistage attack. The Excel macro downloads malicious code that then runs the exploit on the computer.
While users may inherently trust Excel documents and assume it is okay to open an Excel doc they weren't expecting, caution must be taken. There is a section in Zhang's post on mitigation measures and other basic endpoint security best practices that should be followed, such as disabling macros in Excel. Fortunately, enterprises have additional options they can use to stop malicious macros. Scanning email traffic for spam and downloads via a network-based security device could help identify macros attachments. Suspicious files should be quarantined, deleted or otherwise modified to remove the macros, allowing the recipient to open the file in a safe environment and determine if it is a legitimate document. If it is legitimate and the macro is needed, the file could be retrieved from the quarantine.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email! (All questions are anonymous.)
Recent malware discoveries have found an increase in macro-infected Word and Excel files.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Can Structured Threat Information eXpression improve threat intelligence sharing? Nick Lewis breaks down the evolution of the STIX security framework.continue reading
A new type of WordPress malware, WP-Base-SEO, disguises itself as an SEO plug-in that opens backdoors. Nick Lewis explains how it works and how to ...continue reading
A new exploit of CLDAP servers can be used for a DDoS reflection attack that gives attackers a 70x boost. Nick Lewis explains how to defend against ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.