![]() ![]() ![]() Microsoft received what is diplomatically described by the company as “feedback” on its move, and quietly – not to say silently – rolled back its decision, a U-turn that was uncovered by Bleeping Computer on July 7 th, 2022. ![]() Users worldwide found that the macros they had programmed to help them maximize their productivity had stopped working, because Microsoft had taken a sledgehammer to the problem of malicious macros. Having been made aware of this attack vector in its programs, Microsoft took some fairly major action in February, 2022, blocking all VBA macros by default. For those sorts of functions, macros (or ‘dark macros’ as it seems right to call them) are the innocent assassins of productivity, looking entirely like standard macros to anything that searches for the malware culprit. But it’s also extremely effective if you want to activate a malware command that takes a user (and through them, the company for which they work) to a ransomware site, or execute a self-replicating DDOS attack, or even do something as relatively simple but expensively vexing as launch a lock screen attack. Which is fine if you want to turn a cell unexpectedly green in Excel, or if you want to insert some repeated words into a Word document. Ransomware-as-a-service? There’s a marketplace on the dark web for it ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |