I thought macro threats were gone, but now I am reading that they have changed roles and can still be a security...
headache. How can I stop macro threats and viruses?
Anything that can execute code on a client computer is potentially malicious. Until there are wider efforts to either make a secure shell scripting language like Shill prevalent or add security features to existing scripting languages, enterprises will continue to be challenged by macro viruses and shell scripts.
Simply put, secure shell scripting languages will not stop the development of malicious executables. Using signed shell scripts is a significant step forward, but signed shell scripts can also be used maliciously.
Fortinet Inc. researcher Ruhai Zhang wrote about malware that used an Excel macro as the initial infection vector in a multistage attack. The Excel macro downloads malicious code that then runs the exploit on the computer.
While users may inherently trust Excel documents and assume it is okay to open an Excel doc they weren't expecting, caution must be taken. There is a section in Zhang's post on mitigation measures and other basic endpoint security best practices that should be followed, such as disabling macros in Excel. Fortunately, enterprises have additional options they can use to stop malicious macros. Scanning email traffic for spam and downloads via a network-based security device could help identify macros attachments. Suspicious files should be quarantined, deleted or otherwise modified to remove the macros, allowing the recipient to open the file in a safe environment and determine if it is a legitimate document. If it is legitimate and the macro is needed, the file could be retrieved from the quarantine.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email! (All questions are anonymous.)
Recent malware discoveries have found an increase in macro-infected Word and Excel files.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Zscaler recently discovered a malvertising campaign that spreads the Terror exploit kit through malicious ads. Discover more about the threat with ... Continue Reading
Cybersecurity vendor Wordfence reported a rise in scans for SSH private keys that are often accidentally exposed to the public. Learn how to stay ... Continue Reading
The SANS Internet Storm Center discovered a DDE attack spreading Locky ransomware through Microsoft Word. Learn what a DDE attack is and how to ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.