cognitive cybersecurity intelligence

News and Analysis

Search

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

Cybercriminals are bypassing Microsoft’s blocking of macros in its Office suite by using alternative files to host malware, according to Proofpoint’s Threat Research Team. The usage of macros in malware campaigns has decreased by around 66% between October 2021 and June 2022, following Microsoft’s introduction of macro-blocking features. However, threat actors are now using container files such as ISO and RAR attachments, and Windows Shortcut files to carry malware, with campaigns doing so rising nearly 175% during that period.

Source: threatpost.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts