Macros are out - new ways to spread malware

SophosNews

Share post

Since Microsoft announced earlier this year that it would block macros from the Internet, there has been a trend in cyber crime to use archive formats or disk images to infiltrate systems with malware. The number one gateway is still email.

In February of this year, Microsoft announced that it would block macros from the Internet by default. Such macros have been abused by attackers for years to deliver malware. While the security community speculated that attackers would switch to alternative formats because of Microsoft's decision, Sophos has already confirmed this fact with its telemetry data.

Malware: New paths via other file formats

🔎 Statistics show a decline in file formats with macros (Image: Sophos).

From April to September this year, Sophos has seen a sharp drop in the number of malicious .doc, .docm, .xls and .xlsm files - four popular Office formats used to proliferate malicious macros. At the same time, there was a steady increase in the use of obscure archive formats (ACE, ARJ, XZ, GZ or LZH) up to mid-June and a sharp increase in the more common archive formats (ZIP, 7Z, CAB, TAR and RAR) from September. The use of disk image formats (ISO, VHD, and UDF) for malware distribution has also steadily increased.

Disk image formats are particularly attractive to threat actors because they bypass Microsoft's new Mark of the Web (MOTW) feature. Microsoft uses MOTW to determine whether or not a macro is from the Internet; if this is the case, it is automatically blocked.

Bypass disk image formats Check

Security products should also be able to unpack multiple archive and disk image formats, including unpopular formats, to properly scan these attachments for malware. To further mitigate the risks, email filters can be configured to block certain file formats by default. E-mails are still one of the main attack vectors.

E-mails remain dangerous

🔎 The number of archive file formats for attacks is increasing significantly (Image: Sophos).

Chester Wisniewski, Principal Research Scientist at Sophos, says: “We've been giving the same advice on email security for years. Things like 'don't click on this link' or 'don't open dangerous attachments'. The reality is that the cybersecurity landscape is constantly changing. It is unlikely that cyber criminals will abandon macros entirely, as they are highly likely to adapt to these latest Microsoft security measures. Businesses should do the same. Good email security needs to be managed centrally, with security teams focusing on the technical aspects, e.g. B. which file extensions are dangerous. It is also important to educate users on how to avoid falling for the tricky social engineering of cybercriminals.”

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more