{"id":1707,"date":"2022-02-09T20:20:55","date_gmt":"2022-02-10T03:20:55","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=1707"},"modified":"2022-02-09T20:25:22","modified_gmt":"2022-02-10T03:25:22","slug":"microsofts-new-anti-malware-protocol-disabling-internet-macros-by-default","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/09\/microsofts-new-anti-malware-protocol-disabling-internet-macros-by-default\/","title":{"rendered":"Microsoft&#8217;s New Anti-Malware Protocol: Disabling Internet Macros by Default"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/images.unsplash.com\/photo-1632239776255-0a7f24814df2?ixlib=rb-1.2.1&amp;ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&amp;auto=format&amp;fit=crop&amp;w=2071&amp;q=80\" alt=\"\" \/><figcaption><em>Photo by Ed Hardie via https:\/\/unsplash.com\/@impelling<\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>Microsoft recently announced that effective April 2022 all VBA macros retrieved from the web will now be <em>disabled<\/em> <em>by default<\/em> for the  following five Windows applications: Excel, Word, Access, Powerpoint, and Visio.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-vba-macro\">What is a VBA Macro?<\/h2>\n\n\n\n<p>A <strong>macro<\/strong><em> <\/em>is a way to record, store, and run a series of commands, most often used to automate repetitive tasks in Office apps. <strong>Visual Basic for Applications (VBA)<\/strong> is a programming language used to write Office macros.<\/p>\n\n\n\n<p>Lots of office workers use VBA macros regularly, including me. At my current job I recently wrote some simple code that links a data entry form to a spreadsheet. The macro is embedded in the actual file and runs whatever code is saved on it, once enabled by the user.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-s-the-big-deal\">What&#8217;s the Big Deal?<\/h2>\n\n\n\n<p>Malicious agents can take advantage of this feature by embedding malware in any document that supports VBA. <\/p>\n\n\n\n<p>The document is then typically shared online or via email in a <em>phishing\/spearphishing<sup>1<\/sup> <\/em>campaign. Once the user opens the file and enables macros, the malware executes in the background. This can allow the threat actor access to the user&#8217;s stored files, network, personal information, and even gain remote access to their machine. <\/p>\n\n\n\n<p>Since the malware exists within the Office file, it can spread and embed into other files, and compromise all of the user&#8217;s Office documents. Since VBA is compatible with all five Office apps, it can also spread across platforms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-weakness\">The Weakness<\/h2>\n\n\n\n<p class=\"has-text-align-left\">While Microsoft already provides a security prompt to users about macros:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Screen-Shot-2022-02-09-at-4.57.28-PM-1.png\" alt=\"\" class=\"wp-image-1725 lazyload\" width=\"571\" height=\"24\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Screen-Shot-2022-02-09-at-4.57.28-PM-1.png 619w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Screen-Shot-2022-02-09-at-4.57.28-PM-1-300x13.png 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Screen-Shot-2022-02-09-at-4.57.28-PM-1-600x26.png 600w\" data-sizes=\"(max-width: 571px) 100vw, 571px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 571px; --smush-placeholder-aspect-ratio: 571\/24;\" \/><figcaption><em>2: <a href=\"https:\/\/therecord.media\/microsoft-blocks-internet-macros-by-default-in-five-office-applications\/\">Old Warning Prompt<\/a><\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>This doesn&#8217;t seem to be enough of a deterrent. All a threat actor needs to do is convince the unknowing (non-technical) user to Enable Content via some <em>Social Engineering<\/em>. Once the file is downloaded, the last line of defence between the user and the threat becomes the single click of a mouse.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" data-src=\"https:\/\/therecord.media\/wp-content\/uploads\/2022\/02\/macro-document.png\" alt=\"\" width=\"-78\" height=\"-52\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: -78px; --smush-placeholder-aspect-ratio: -78\/-52;\" \/><figcaption><em>2: <\/em><a style=\"font-style: italic\" href=\"https:\/\/therecord.media\/microsoft-blocks-internet-macros-by-default-in-five-office-applications\/\">Example of basic luring tactic<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>This creates a huge population of vulnerable users since the Office Suite is a common preference for many organizations, public and private. Too often, many users (and some organizations) are not even aware of this risk, making it (in my opinion) the developer&#8217;s responsibility to ensure proper safety measures are enacted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-s-solution\">Microsoft&#8217;s Solution<\/h2>\n\n\n\n<p>As of Version 2203 (incoming this April), all macros in files retrieved from the internet will be <strong>blocked by default.<\/strong><\/p>\n\n\n\n<p>Users will no longer be able to easily Enable Content, and will be notified with the following prompt: <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/342371i5535164A2FB05196\/image-size\/large?v=v2&amp;px=999\" alt=\"\" width=\"533\" height=\"20\" \/><figcaption><em>3: <\/em><span><a style=\"font-style: italic\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">New Security Prompt<\/a><\/span><\/figcaption><\/figure><\/div>\n\n\n\n<p>Clicking <strong><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/a-potentially-dangerous-macro-has-been-blocked-0952faa0-37e7-4316-b61d-5b5ed6024216\">Learn More<\/a><\/strong><sup> 4<\/sup> links to a web page informing users about the security risks from downloading macros, some safe practices, and how to enable macros once the user is certain the file contents are safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mark-of-the-web-motw\">Mark of the Web (MOTW)<\/h2>\n\n\n\n<p>Any file retrieved from an untrusted source like the internet will be labelled as having the MOTW, automatically blocking all Macros from running. To run Macros, a user must save the file and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/a-potentially-dangerous-macro-has-been-blocked-0952faa0-37e7-4316-b61d-5b5ed6024216\">manually remove<\/a> the MOTW.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/342776i5D9AB520C0DDF0F1\/image-size\/large?v=v2&amp;px=999\" alt=\"\" \/><figcaption><em>3: <\/em><span><a style=\"font-style: italic\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">Evaluation Flow with New Default Protocol<\/a><\/span><\/figcaption><\/figure><\/div>\n\n\n\n<p>To end on some general tips Microsoft offers<sup>4<\/sup>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Only open file attachments that you are expecting<\/li><li>Only open files from Trusted Locations\/Trusted Publishers <\/li><li>Be suspicious of files encouraging you to Enable Content <\/li><li>If you download a file with macros, and you&#8217;re unsure what they do, just delete that file <\/li><\/ul>\n\n\n\n<p>With this new feature, Microsoft hopes to simultaneously deter malicious agents while educating end-users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"sources\">Sources<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>1: <a href=\"https:\/\/www.cynet.com\/attack-techniques-hands-on\/office-macro-attacks\/\">https:\/\/www.cynet.com\/attack-techniques-hands-on\/office-macro-attacks\/<\/a><\/li><li>2: <a href=\"https:\/\/therecord.media\/microsoft-blocks-internet-macros-by-default-in-five-office-applications\/\">https:\/\/therecord.media\/microsoft-blocks-internet-macros-by-default-in-five-office-applications\/<\/a><\/li><li>3: <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805<\/a><\/li><li>4: <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/a-potentially-dangerous-macro-has-been-blocked-0952faa0-37e7-4316-b61d-5b5ed6024216\">https:\/\/support.microsoft.com\/en-us\/topic\/a-potentially-dangerous-macro-has-been-blocked-0952faa0-37e7-4316-b61d-5b5ed6024216<\/a><\/li><li>5: <a href=\"https:\/\/thehackernews.com\/2022\/02\/microsoft-disables-internet-macros-in.html\">https:\/\/thehackernews.com\/2022\/02\/microsoft-disables-internet-macros-in.html<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft recently announced that effective April 2022 all VBA macros retrieved from the web will now be disabled by default for the following five Windows applications: Excel, Word, Access, Powerpoint, and Visio. What is a VBA Macro? A macro is a way to record, store, and run a series of commands, most often used to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/09\/microsofts-new-anti-malware-protocol-disabling-internet-macros-by-default\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft&#8217;s New Anti-Malware Protocol: Disabling Internet Macros by Default&#8221;<\/span><\/a><\/p>\n","protected":false},"author":401,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1707","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Achraf Abdelrhafour","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/achraf-abdelrhafour\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/401"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=1707"}],"version-history":[{"count":33,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1707\/revisions"}],"predecessor-version":[{"id":3165,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1707\/revisions\/3165"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=1707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=1707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=1707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}