Microsoft Tackles Macro Malware
Microsoft is making it harder for scammers to distribute ransomware and other malware through Office documents. However, the tighter block on visual basic macros running by default may frustrate some users.
A macro is a way of reducing a series of instructions to a single instruction, while VBA (visual basic language) is a way of handling macros in Microsoft programs. It's often used for frequently performed tasks.
To give a hypothetical example, a user could create a macro in a spreadsheet that means pressing a couple of keys together which tells the computer to check two columns for any likely typos (such as missing a decimal point), averaging the contents of the two columns, then immediately saving the file.
Ransomware Risk
The problem with macros is that scammers can insert them into Office documents and trick people into opening them. The macro then carries out malicious instructions, often taking advantage of known operating system or MS Office flaws.
One researcher quoted by The Verge estimated that macros are used in around 25 percent of successful ransomware attacks. (Source: theverge.com)
Until now, a file with a VBA macro displays a "Security Warning" but simply noted that "Macros have been disabled" and showed a button reading "Enable Content" than runs the macro. While this might alert some users, it isn't necessarily going to seem suspicious to somebody who has already been misled into opening the document.
Red Alert
The change means files opened from attachments or downloaded from the Internet will carry a more explicit warning with a red background and the wording "SECURITY RISK. Microsoft has blocked macros from running because the source of this file is untrusted."
There will no longer be an option to click a button to enable the macros. Instead users will have the option to click a button reading "Learn More." This will bring up an article explaining more details about macros and the risks. (Source: microsoft.com)
To run the macro, the user will have to read through the article, save the document to a hard drive, then change a setting in its file properties to unblock macros.
What's Your Opinion?
Is this a smart move by Microsoft? Will it reduce the number of malware victims? Will it cause too much disruption to people who get legitimate files with macros as attachments or downloads?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
Automatic macro submission and rating
Microsoft could go a step further and have the macro submitted (or its hash) to a centralized page that has reviews from other users that state whether or not the macro in question is harmful or not - sort of like using virustotal.com and web of trust. Or better yet, have all newly downloaded macros scanned by Windows Defender and automatically deleted if it's known to be malicious based on reputation.
Proofreading comment
Your second sentence refers to "virtual basic macros." Did you mean to say, "visual basic macros" at that point? (And feel free to delete this comment if you do change the text.)
The weakest point
Many times, the weakest point for malware entry is the mouse or keyboard. People need to be a little skeptical unless they are certain. When I was looking after the computers at the company I worked for (not my primary responsibility), most issues we had resulted from people not taking the few seconds to question "should I do this?". I wish that people would take a moment to research before clicking or hitting enter but they likely will not. I agree completely with you Dennis. It needs to be a built in function either through deletion or warning.