• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Hackers Change Tactics for New Post-Macro Era

You are here: Home / General Cyber Security News / Hackers Change Tactics for New Post-Macro Era
July 28, 2022

Danger actors are going away from macro-dependent attacks to other ways, in 1 of the most significant shifts in the email threat landscape in new record, in accordance to Proofpoint.

Microsoft declared in October 2021 that it would quickly block XL4 macros which are specific to Excel. Several months afterwards it said the same about VBA macros, which are applied in Business apps. Menace actors commonly use social engineering to convince customers they want to enable macros to check out specific content.

The improvements began to roll out this year, and Proofpoint saw an practically fast response from the cybercrime local community.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It claimed the use of macro-enabled attachments by danger actors diminished by all over 66% amongst October 2021 and June 2022.

However, ever-resourceful hackers have discovered a way to bypass Microsoft’s new rules to go on offering malicious material to victims.

“Microsoft will block VBA macros primarily based on a Mark of the Web (MOTW) attribute that displays no matter if a file arrives from the internet recognised as the Zone.Identifier. Microsoft applications increase this to some files when they are downloaded from the web,” stated Proofpoint.

“However, MOTW can be bypassed by working with container file formats. Menace actors can use container file formats these as ISO, RAR, ZIP and IMG files to send macro-enabled paperwork.”

The seller defined that downloaded container documents like ISO and RAR will have the MOTW attribute since they were downloaded from the internet, but the document inside, this sort of as a macro-enabled spreadsheet, will not. The moment the doc is extracted, the user will still have to allow macros for destructive code to execute, but the file process will not establish the document as coming from the web.

“Additionally, risk actors can use container information to distribute payloads right. When opened, container information may incorporate extra information these types of as LNKs, DLLs, or executable data files that lead to the set up of a destructive payload,” Proofpoint added.

As a end result, the security vendor has noticed the number of malicious strategies employing container file formats surge 176% amongst October 2021 and June 2022.

These attacks are predominantly employed for initial accessibility, Proofpoint mentioned.

“Proofpoint researchers assess with superior confidence this is 1 of the most significant email danger landscape shifts in the latest heritage,” it concluded. “It is most likely threat actors will continue to use container file formats to produce malware, when relying considerably less on macro-enabled attachments.”


Some parts of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Hackers Change Tactics for New Post-Macro Era
Next Post: European company unmasked as cyber mercenary group with ties to Russia european company unmasked as cyber mercenary group with ties to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.