VBA (Visual Basic for Applications) macros haven’t been a significant malware threat for a few years now. Ever since Microsoft disabled VBA macro execution by default in the Microsoft Office suite, VBA macro malware can’t execute without user intervention.
From the point of view of malware developers, though, this is not a defeat. It’s just a challenge to overcome. Rather than abandoning VBA macro malware completely, malware developers simply came up with a new approach to lure users into enabling VBA macro execution, and opening their PCs up to attack.
A white paper by a Sophos Labs researcher describes the new VBA macro threat in detail, and summarizes why it is that attackers don’t need to bother with sophisticated exploit code. The user is the weakest link, and it’s much easier to execute an attack through social engineering rather than trying to outsmart the operating system or applications.
Take a look at this post from my Minimal Risk blog on CSOOnline.com: VBA macros are a serious malware threat once again
- Unlocking Proactive Compliance with Adobe’s Common Controls Framework - October 14, 2024
- Unlocking the Power of Continuous Threat Exposure Management - October 8, 2024
- The ReliaQuest Mindset: A Competitive Edge in Cybersecurity - October 4, 2024
View Comments (1)
Hmmm... I use a Mac but with Office 2011 Microsoft kindly gifted VBA upon us (prior to that Mac versions of Office lacked it). Does anybody know if Office for the iPad has VBA capabilities? It would make TOTAL sense if Microsoft provided the first malware vector for iOS.