I thought macro threats were gone, but now I am reading that they have changed roles and can still be a security...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
headache. How can I stop macro threats and viruses?
Anything that can execute code on a client computer is potentially malicious. Until there are wider efforts to either make a secure shell scripting language like Shill prevalent or add security features to existing scripting languages, enterprises will continue to be challenged by macro viruses and shell scripts.
Simply put, secure shell scripting languages will not stop the development of malicious executables. Using signed shell scripts is a significant step forward, but signed shell scripts can also be used maliciously.
Fortinet Inc. researcher Ruhai Zhang wrote about malware that used an Excel macro as the initial infection vector in a multistage attack. The Excel macro downloads malicious code that then runs the exploit on the computer.
While users may inherently trust Excel documents and assume it is okay to open an Excel doc they weren't expecting, caution must be taken. There is a section in Zhang's post on mitigation measures and other basic endpoint security best practices that should be followed, such as disabling macros in Excel. Fortunately, enterprises have additional options they can use to stop malicious macros. Scanning email traffic for spam and downloads via a network-based security device could help identify macros attachments. Suspicious files should be quarantined, deleted or otherwise modified to remove the macros, allowing the recipient to open the file in a safe environment and determine if it is a legitimate document. If it is legitimate and the macro is needed, the file could be retrieved from the quarantine.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email! (All questions are anonymous.)
Recent malware discoveries have found an increase in macro-infected Word and Excel files.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis ...continue reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar ...continue reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.