frenta - Fotolia
I thought macro threats were gone, but now I am reading that they have changed roles and can still be a security headache. How can I stop macro threats and viruses?
Anything that can execute code on a client computer is potentially malicious. Until there are wider efforts to either make a secure shell scripting language like Shill prevalent or add security features to existing scripting languages, enterprises will continue to be challenged by macro viruses and shell scripts.
Simply put, secure shell scripting languages will not stop the development of malicious executables. Using signed shell scripts is a significant step forward, but signed shell scripts can also be used maliciously.
Fortinet Inc. researcher Ruhai Zhang wrote about malware that used an Excel macro as the initial infection vector in a multistage attack. The Excel macro downloads malicious code that then runs the exploit on the computer.
While users may inherently trust Excel documents and assume it is okay to open an Excel doc they weren't expecting, caution must be taken. There is a section in Zhang's post on mitigation measures and other basic endpoint security best practices that should be followed, such as disabling macros in Excel. Fortunately, enterprises have additional options they can use to stop malicious macros. Scanning email traffic for spam and downloads via a network-based security device could help identify macros attachments. Suspicious files should be quarantined, deleted or otherwise modified to remove the macros, allowing the recipient to open the file in a safe environment and determine if it is a legitimate document. If it is legitimate and the macro is needed, the file could be retrieved from the quarantine.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email! (All questions are anonymous.)
Recent malware discoveries have found an increase in macro-infected Word and Excel files.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading
Cloud security providers need to play catch-up with the evolving advancements in cloud technology. Find out what the top CSPs offer today and which ... Continue Reading
Cloud security certifications serve to bolster security professionals' resumes and boost value to employers. Learn about the top certifications ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.