February 4, 2016 By Douglas Bonderud 2 min read

Macro malware was a big player in the malicious code market 20 years ago. According to SC Magazine, it’s now back at large thanks to a newly discovered Neutrino bot (also known as Kasidet) dropper looking to open backdoors and grab user data with memory scraping and browser-hooking malware. But why the sudden uptick in this outdated method? More importantly: How come it’s working so well?

What’s Old Is New Again

As noted by Dark Reading, the new Kasidet dropper uses Visual Basic for Applications (VBA) macros found in Microsoft Office to deliver its malicious payload. It all starts when users open the *.doc file attached to an unsolicited email, which prompts them to turn on macros.

Along with a nonsense document, however, they get a Neutrino infection that hooks into any browsers and includes point-of-sale (POS) RAM-scaping malware. Although Microsoft took steps to mitigate the use of macro malware — and things were relatively quiet for 15 years — in the last 18 months, this attack method has enjoyed significant growth, even with employees (hopefully) educated about the dangers of opening unsolicited emails.

It’s also worth noting that Kasidet’s creators have been busy upgrading their code. The original version included multiple distributed denial-of-service (DDoS) features, while the new offering comes with high-risk POS targeting. Simply put? What’s old is new again as malware-makers leverage finite user memories to spread a whole new set of macro malware.

Increasingly Sophisticated

A reliance on old infection methodologies doesn’t mean these malware-makers lack ingenuity. Consider a recent Graham Cluley blog post detailing another Neutrino infection attempt: There, the document in question seemingly came from a linked network printer simply delivering a scanned document.

It’s clever, especially in a network setting where users don’t know offhand the exact model number and type of printers used by every department. With seemingly legitimate email origins, it’s not hard to see why some employees are duped into opening the attachment and enabling the requested macros.

Business Solutions, meanwhile, pointed to a rise in not only macro attacks, but also fileless malware that loads directly into the memory space of specific functions, hides behind APIs or lurks in the system registry. Combined with effective macro malware spear phishing, the results can be devastating: Employees used to getting macro-laden documents from somewhat familiar addresses gladly open attachments that in turn drop POS scrapers or even harder-to-detect fileless infection vectors onto corporate networks.

Managing Macro Malware

This kind of macro madness won’t last forever. As businesses wise up and detection methods improve, malicious actors will modify their approach. In the interim, however, the return to old-school infection methods demands a similar replay of past-tense responses: If employees aren’t expecting a specific document, they should ignore or delete the email.

If uncertain, email the sender directly, and if it’s from a printer or scanner and wasn’t directly requested, notify IT. Bottom line? Macros are back, and companies need to micromanage email handling until malware-makers take their trade somewhere else.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today