Microsoft has just 'lowered' the way hackers use to control computers
Recently, Microsoft has successfully "eradicated" the popular way that computer criminals prefer to use it for years to take control of users' computers. Updating in the Office 2016 Suite gives enterprise administrators the right to block the process of running macros in files - macros can allow running authorized tasks but often lead to Internet connection and downloading software poisoning (malware).
Usually, hackers send a phishing email with an Office file attached and claim to be someone in the company to get the recipient to open the file. This file will cause the user to activate the macro and thereby cause their computer to become infected despite repeated warnings.
An analyst is looking at code at a malware lab at Idaho National Laboratory's cybersecurity center in Idaho Falls, Idaho
Microsoft wrote on its blog, " The appeal of using macro-based malware is because of very easy to activate macros. Previous versions of Office include warnings when opening macro files but The authors of these malware seem to have adapted quite quickly when using social engineer techniques - a non-technical method to break into a system or corporate network, attracting users, making them activate macros and news. that there will be no problem but still poisoned ".
Macros are blocked when users intentionally open files
Now the user no longer has the right to decide. If the administrator decides to block macros, the user will receive a message warning that the macro has been disabled for security reasons. Undoubtedly, this will undoubtedly be a change adopted by many businesses, especially businesses that are often the target of this type of attack. About 91% of attacks are targeted to use spear email - phishing (a phishing form like phishing but designed to a specific goal) and Microsoft statistics show that 98% of the threats are related to Office software using macros .
Although attack by macros is easy to remove, the consequences they bring can be surprising, for example, hackers who hold company data that can be used to extort money, or hacked machines can be Used to cut electricity of thousands of houses.
Author: Paul Szoldra
You should read it
- How to troubleshoot macros in Excel not working
- What is a macro in Excel? How to create and run a Macro in Excel
- MS Excel 2003 - Lesson 8: Excel Macro - Automate complex tasks
- How to turn on / off Macro in Word
- What is Safe Malware? Why is it so dangerous?
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- How to fix Office error 'The function you are attempting to run contains macros'
- 6 tips to protect your printer from hackers
May be interested
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- How to use Ultraviewer to control remote computersultraviewer will also help users to control and support remote computers without having to be in place, making the job much easier and more convenient. the following is a guide to installing and using ultraviewer to control remote computers.
- Classify hackers and career opportunities for true hackersmust white hat hackers, black hat hackers, gray-hat hackers have to be all kinds of hackers in the world? let's find out the hacker classification in this article.
- Computers can be controlled by hackers because of YM errorsbuffer overflows in two activex web components of the online messaging tool can provide an opportunity for hackers to install viruses, trojans to steal information or install backdoors to control a victim's computer.
- Update Teamviewer now if you don't want to be hackedteamviewer has released an emergency patch that allows hackers to take control of the computer when they are in the remote control session.
- TeamViewer is attacked by Chinese hackers, any computer logged in can be controlledteamviewer - a remote control tool used by a lot of people, has been hacked by chinese hackers.
- Do you know who white hat hackers are and how their lives are?what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?
- Microsoft opens its own website for hackersmicrosoft often hired hackers to search for security flaws or unlock security mechanisms built into its software with the goal of making products more secure.
- Hackers take control of the update tool, attacking tens of thousands of ASUS computershackers have taken control of the upgrade tool - asus live update utility is preinstalled on the vast majority of asus new devices and silently installs malware on devices.
- [Infographic] Things to know about a hackerhave you ever considered a hacker to be a career? the infographic below will help you know if becoming a hacker is right for you.