This website uses cookies for some functions to work. Click here to read our privacy policy and learn about our use of cookies.
NordVPN Get 3 months free

Microsoft to Fight Macro-based Malware with a New Feature in Office 2016

Macros are one of the most popular medium for malicious users to spread malware. Macro-based malware is usually spread via emails and other means of communication.

These emails typically use attention-grabbing titles and message to lure users into opening attachments and eventually infecting his/her device.

Microsoft Office is one of the prime victims of Macro-based malware. Microsoft also acknowledge that macro-based malware is on the rise as recent data from Microsoft’s Office 365 Advanced Threat Protection service suggests that 98% of Office-targeted threats use macros.

Although Microsoft Office applications display a warning prior to opening a macro, strong social engineering tactics used by attackers end up convincing users into enabling macros.

Microsoft Macro Detection
Source: Microsoft

Fighting Macro-based Malware with Office 2016

To fight macro malware, Microsoft is introducing a new security feature in Office 2016 which blocks macros from loading in certain ‘high-risk scenarios.’ This tactical feature in Office 2016 can help enterprise administrators prevent the risk from macros. This feature allows an administrator to selectively scope macro use to a set of trusted workflows and block easy access to enable macros in specific scenarios.

The new security feature will also provide end users with stricter notification making it easier for them to distinguish a high-risk situation against a normal workflow.

Macro Malware Office 2016

This feature can be controlled via Group Policy and configured per application. Administrators can block macros from running in Word, Excel and PowerPoint documents that come from the Internet.

pCloud Encrypted Cloud Storage

Macro-based Malware: How to ensure protection?

To ensure maximum protection from malware spread via macros and other similar mediums, it is best to avoid opening attachments sent by unknown sources. Attackers usually have strong skills to convince you to open emails and attachments. If you’re unsure about particular attachments, you should always consult your IT department before opening suspicious emails and attachments.

Have you ever been victim of macro-based malware? Share your thoughts and experience with us.

Source: Microsoft

Support Me: If this article/tutorial helped you today, please consider supporting me and help me run frunction.com