So this can be prevented simply by blocking outgoing network connection in Office apps.My observations about malicious macros.
- Most macros simply download payloads and execute them.
If Word can't order pizza, pizza will not come, right?
So this can be prevented simply by blocking outgoing network connection in Office apps.My observations about malicious macros.
- Most macros simply download payloads and execute them.
The macro script might not connect out at all - it really depends on the attackers motives and what they are trying to do. On the bright side, you for sure will have a backup of your data, so in that case... nothing can be done that you aren't going to be capable of undoing at ease.So this can be prevented simply by blocking outgoing network connection in Office apps.
If Word can't order pizza, pizza will not come, right?
Simple cradles can be stopped by disabling Internet connection to MS Office applications, interpreters, Bitsadmin.exe, etc.So this can be prevented simply by blocking outgoing network connection in Office apps.
If Word can't order pizza, pizza will not come, right?
Although you need to ENABLE macros, there are all kinds of ingenious social engineering tricks that will motivate the unwitting novice to click here, follow the arrow, click there...
That's what worries me.
Some macros cannot be successfully executed in non-MS Office applications, for example, those with Word.Application or Excel.Application objects or GetObject function. Furthermore, my macros which were automatically run in MS Office, were not automatically run in LibreOffice. They can be run via: Tools >> Macros >> Execute macro ...
Yet, malicious OLE embedded in MS Office documents can be executed successfully also in LibreOffice.
So this can be prevented simply by blocking outgoing network connection in Office apps.
If Word can't order pizza, pizza will not come, right?
Most of malicious documents can be dangerous only for the happy clickers. They also do not know what mean the words: macro, OLE, ActiveX, etc.
Doesn't this have to do mostly with updating data within office files across the internet or just maintaining updated and synced data banks? Grabbing data for presentations or reports and this kind of thing is what I mean. Yes, you can for this just write the app, but MSO does seem to be to be much more powerful to me with this capability in place. Generally, I think this is usually accounting data or sales data that is updated to a main database and from there referenced. So I think MS opened the internet channel to VB.
My question is, why isn't VB more tailored for safe use and use within Office only? By this I mean, why can't there be a secure and usable channel for working with office files via macro across the internet or an intranet that uses a properly refined and limited language? Seems to me there could be correlative software in MSO, also, designed for enforcement of security policy for office documents across an intranet or the internet. This would be "support" and assist with security policy enforcement, but MS obviously doesn't understand the first thing about the corporate work environment and how rigid it really must be. Don't think MS has 5 seconds thought in the securability of MS Office at this point, in spite of the fact that it's a main channel for potential trouble. All of this is strange to me considering the size of MS itself.
By the way, I read of an instance where a company was using office to maintain and monitor the functions of machinery across an entire assembly line. On the surface, I thought it was a kind of a cool idea, but it sure seemed clumsy to me to be using Excel to view data about the machines along the line, knowing the bits I know about Office and macros. They don't run very fast in my experience when operating on an Excel sheet or Word or whatever page. This company I think was updating data every 2 seconds. Working with data that way in Office is dangerous, anyway. You can grab data and it only be partly updated...if you grab it from an updating file. All kinds of weird things can happen.
Before running a questionable macro one thing I guess someone could do would be to take it to Microsoft Answers or StackOverflow and ask what the macro does.
Sadly, it is not as simple as it looks. The companies and Institutions have a lot of old documents and templates, which work well only with MS Office. I worked in the Institution, that tried to use OpenOffice - this experiment was a big mess.People who manage and run a company are wise to avoid Microsoft Office - if they can. Microsoft Office is one of Microsoft's methods of holding the world hostage. Actually, it can be looked at both ways... anyone who uses Office is only victimizing themselves.
Sadly, it is not as simple as it looks. The companies and Institutions have a lot of old documents and templates, which work well only with MS Office. I worked in the Institution, that tried to use OpenOffice - this experiment was a big mess.
I do not think that macros were introduced for the home users. Microsoft probably wanted to give admins a handy tool for automating document management and leave other Office suites behind. The simplest way was not inventing the safe macro language, but adopting the well known programming language Visual Basic 6.0. That is a way of corporation thinking. They do not think about the customers' security but about the money.
I have dozens of processes disabled, and some others monitored. Just trying to understand how things work, as usual...I think\get the impression that you have issues with disabling processes ? That if it is shipped with Windows then it is meant to be there and used ? That line of thinking will get you infected - and Microsoft's security division will be the first to tell you to disable stuff.
Maybe you guys could explain what VBS actually is, since we are talking so much about about it. Yeah, it stands for Visual Basic Script, and files of this type open by default with wscript, but... what's it really all about, from a security perspective?
I have dozens of processes disabled, and some others monitored. Just trying to understand how things work, as usual...
VBScript and JScript are the part of Windows Script Host. The first was rooted in Visual Basic, the second is almost the same as JavaScript. The Windows scripts evolved from batch files (*.bat) through VBScript and JScript to PowerShell. They were all intended for automation of several admin tasks (jobs). So, the malc0der can do the same as the admin can, if he is able to get admin privileges. VBScript (JScript) can manage for example: Windows services, COM interfaces, WMI, shellcode.Maybe you guys could explain what VBS actually is, since we are talking so much about about it. Yeah, it stands for Visual Basic Script, and files of this type open by default with wscript, but... what's it really all about, from a security perspective?