Blocked macros: Attackers find new ways

Blocked macros: Attackers find new ways

Share post

Since Microsoft has now blocked all macros by default, cyber attackers have been looking for new ways - and they find them. Security researchers from Proofpoint observed this and were able to gain insights into the behavior of cybercriminals.

These warps are largely due to Microsoft now blocking macros by default. All players in the cybercriminal food chain - from the small, inexperienced hacker to the most experienced cybercriminals executing large-scale ransomware attacks - are therefore forced to adapt the way they work.

No macros? There are other ways!

🔎 Since VBA and XL4 macros are blocked, attackers like Qbot are switching to other file types, like HTML smuggling or VHD (Image: Proofpoint).

Proofpoint's security researchers were able to gain valuable insights into the changing behavior of cybercriminals. As a result, attackers are now experimenting extensively with legacy file types, unexpected attack chains, and a variety of techniques to proliferate their malware payloads – including ransomware.

Proofpoint was able to make the following observations:

  • Cyber ​​criminals continue to test different approaches to find the most effective way to compromise a target via email. This shows that there is no reliable, uniform method that is used by all actors in the cybercrime ecosystem.
  • As soon as a group of cybercriminals uses a new technique, it is also used by other groups of criminals in the weeks or months that follow.
  • The most sophisticated cybercrime actors have the time and resources to develop and test new malware delivery techniques.

The example of the cybercriminal group TA570, also known as "Qbot", is a good illustration of how much the perpetrators now vary in their efforts to deliver malware to their potential victims.

Qbot changes its entire strategy

Originally, i.e. before June 2022, TA570 almost exclusively used VBA macros and XL4 macros in its campaigns to distribute malware payloads. This was usually Qbot, but also IcedID. In June 2022, Proofpoint's security researchers were able to observe the first changes. The group turned to several new Tactics, Techniques and Procedures (TTPs), most notably using HTML smuggling for the first time.

In the months that followed, TA570 resorted to new and different TTPs, using up to six different and unique attack chains and numerous file types in one month. File types included PDF, LNK, Virtual Hard Disks (VHD), ISO, OneNote, Windows Script File (WSF), and XLLs, among others.

The Proofpoint experts have compiled their findings on the disappearance of macros as an attack vector in a detailed investigation in a PDF report.

Directly to the PDF report at Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more