• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
'this is a terrible idea': security experts bemoan microsoft’s backtrack

‘This is a terrible idea’: Security experts bemoan Microsoft’s backtrack on blocking VBA macros

You are here: Home / General Cyber Security News / ‘This is a terrible idea’: Security experts bemoan Microsoft’s backtrack on blocking VBA macros
July 8, 2022

Shutterstock

Microsoft has quietly admitted it will re-allow Visual Fundamental Application (VBA) macros on Business office files, backtracking on a broadly-praised shift  earlier this yr that sought to block their use by default.

VBA macros in Microsoft Business documents have been abused by cyber criminals for many years, generally as a way to drop malware or ransomware on to business networks, ordinarily in conjunction with a phishing campaign.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Seemingly benign Business office files could carry malware that’s then mounted on an unwitting victim’s personal computer just after they simply click an ‘enable content’ banner just after opening the doc that is normally connected to an email.

Security industry experts from throughout the sector have closely criticised Microsoft’s determination to reverse its stance on VBA macros, with figures such as Eva Galperin, director of cybersecurity at the Electronic Frontier Basis (EFF), expressing “this is a horrible idea”.

“I’ve shed track of the variety of campaigns I observed targeting civil society that utilised business office macros to put in malware,” she extra. 

“Weird selection listed here by Microsoft to roll again its determination to block VBA macros by default,” added Selena Larson, senior risk intelligence analyst at Proofpoint. “The improve experienced by now begun to impact threat actor behaviours to use other matters.”

Risk Actors when they recognize Microsoft now enables macros by default again pic.twitter.com/YJG77qZWKE

— vx-underground (@vxunderground) July 8, 2022

Earlier this 7 days, a contributor to a Microsoft forum questioned if Microsoft had reversed its stance on macros following noticing the reverted behaviour while making an inner presentation on their company’s macro-enabled toolkit.

Replying on the thread, Angela Robertson, principal team item supervisor at Microsoft Office 365’s id and security team, verified the rollback was occurring thanks to group responses indicating the alter was ideal.

Robertson included that Microsoft was preparing a whole update for the community and the rationalization of the selection will be launched in time.

Other contributors in the discussion board thread criticised Robertson’s group for not properly communicating the change in advance of making it.

The unique guiding the primary forum write-up explained their company was forced to pay for a electronic certificate to indication their VBA macro initiatives and devote time making certain their atmosphere was set up for customers in the the very least inconvenient way feasible, only for Microsoft to backtrack with out warning.

“Rolling again a a short while ago applied change in default conduct with out at minimum asserting the rollback is about to transpire is pretty inadequate merchandise management,” they stated. “I recognize your apology, but it truly must not have been vital in the initially area, it is not like Microsoft are new to this.”

IT Pro approached Microsoft for more info but it did not reply.

What are VBA macros and why did Microsoft block them?

VBA macros allow Microsoft Business office doc creators to add performance to things like spreadsheets that automate guide functions. Accounting and finance groups in businesses are acknowledged to make use of them regularly.

Cyber criminals realised a long time in the past the characteristic could be abused to trick customers into installing malware working with the exact automation functionality.

A popular danger vector concerned criminals convincing small business users to down load a seemingly innocuous Business office document from an email and open it even though connected to their corporate network. 

On opening the document, people would be offered with a banner prompting them to ‘enable content’. The doc would be frozen and unusable right up until the banner prompt was acknowledged.

Enabling the content that was preloaded by the attacker would then guide to the document downloading and putting in malware or ransomware on to the victim’s device.

This attack is pretty popular, according to Netskope, which concluded that macro-enabled Business paperwork that led to the down load of malware enhanced 37% in 2021 as opposed to 2020.

Joseph Carson, main security scientist at Delinea, stated the choice to disable VBA macros by default was “a large earn for security” when the announcement was to start with produced in February this yr, talking to IT Pro at the time.

The blocking of VBA macros came into impact two months afterwards in April 2022, and in the similar week, cyber criminals were being now demonstrating means to bypass the default macros principles to fall Emotet malware and other exploit other code execution vulnerabilties.

Speaking to IT Pro at the time, Sherrod DeGrippo, vice president of menace research and detection at Proofpoint, mentioned that macro-enabled files fashioned “a substantial part of the threat landscape” but risk actors will usually find new methods to infect close-buyers.




Some sections of this posting are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Chinese Cyber Espionage Groups Increasingly Targeting Russia
Next Post: Lawyers Urged to Stop Advising Clients to Pay Ransomware Demands Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.