New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co

New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co

Share post

The use of macros to spread malware has declined significantly: by as much as 2021 percent between October 2022 and June 66. However, attackers are beginning to use tricks to circumvent the protection.

Commonly, cyber criminals use VBA macros to automatically execute malicious content if a user has macros enabled in Office applications. XL4 macros, on the other hand, are specific to the Excel application, but can also be used by attackers as a tool for spreading malware. The masterminds behind macro-based attacks typically use social engineering to convince the recipient that the content is important and therefore enabling macros is required to view that content.

Containers like ISO, LNK and RAR as a trick

“The fact that cybercriminals are increasingly abandoning the direct distribution of macro-based file attachments in emails represents a significant change in the threat landscape. Attackers are instead using new tactics to distribute malware. It can be expected that the increasing use of file types such as ISO, LNK and RAR will continue,” commented Sherrod DeGrippo, vice president of threat research and detection at Proofpoint.

Circumvention of security functions

Microsoft blocks VBA macros that have a Mark-of-the-Web (MOTW) attribute. This attribute indicates whether a file comes from the Internet and is based on what is known as a Zone.Identifier. Microsoft applications add this attribute to certain documents when they are downloaded from the Internet.

However, cyber criminals can use container file formats such as ISO (.iso), RAR (.rar), ZIP (.zip), and IMG (.img) to evade this MOTW-based security feature. Once downloaded, the container files are tagged with the MOTW attribute since they were downloaded from the Internet, but the document they contain, such as a macro-enabled spreadsheet, is not tagged with the attribute. When the document is extracted, the user still needs to enable macros for the malicious code to run automatically, but the file system will not identify the document as coming from the Internet.

It is also possible for attackers to use container files to directly propagate a malicious payload. For this purpose, container files can contain additional content such as LNKs, DLLs or executable files (.exe) that lead to the installation of such a payload.

Significant changes in the threat landscape

This is what the attack chain looks like to distribute the Bumblebee malware via ISO (image: proofpoint).

Proofpoint's research found a significant decrease in macro-enabled documents sent as email attachments as part of attacks. Between October 2021 and June 2022, their number decreased by more than two thirds. During the same period, the number of campaigns using container files and Windows Shortcut (LNK) attachments increased by nearly 175 percent.

This increase is partly due to the growing use of ISO and LNK files in cyber campaigns. Cyber ​​criminals are increasingly using these as initial access mechanisms, such as those behind the Bumblebee malware attacks. The use of ISO files alone grew by over 2021 percent between October 2022 and June 150. In fact, the number of campaigns that included LNK files has increased by as much as 2021 percent since October 1.675.

More at proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more