How a Bad UI Decision from Microsoft Helped Macro Malware Make a Comeback

starbuck

Malware Removal Specialist - Administrator
In Memory
Joined
Jul 16, 2014
Messages
1,147
Location
Midlands, England
US-CERT warns about a rise in macro malware

edc90c2febd8f3ab2d680c765941d9f3.png


Following numerous reports from various security firms about a large number of malware that uses macro scripts in Office documents to spread, the US-CERT team has issued an official alert to all organizations about this resurging threat.

Macros are not malicious by nature, being added to automate various operations in the Office suite.

Macro malware, as this threat is sometimes called, relies on small scripts attached to Office files that execute when the document is opened, if there's no security restriction.

Macro malware was very popular 20 years ago

Macro malware was extremely popular in the 90s, when it helped many worms and viruses spread, such as the Melissa virus.

Initially, macros had the ability to execute when you opened a file, a feature which malware coders loved.
Microsoft course-corrected with Office 97, showing a very informative popup with all sorts of warnings and options to avoid opening a file with automatically-executing macros.

These popups managed to curb down macro malware popularity, and as the 2000s came, this type of malware distribution technique almost died out.

b0ae5555f7269eaf677445dc3b4c3318.png

Macro script popup in Office 97


Unfortunately, Microsoft made a huge design mistake when it decided that starting with Office 2010 it would remove the informative popup that appeared before the file was opened, and transform it into a notification bar, inside the application, after the user opened the file.

Microsoft still blocked automatic macro execution at document startup, but the notification bar was very light on security warnings and the information needed for Office users to understand what macros were exactly and what are their direct consequences.

Macro malware resurgence is because of one bad UI decision

From a warning in Office 97 that included five lines of text, of which a sentence read "Some macros may contain viruses that could harm your computer," the message was narrowed down to six words saying "SECURITY WARNING Macros have been disabled."

Microsoft didn't give any reason why macros were disabled, or what would happen if the user turned them on.
In Office 2013, right next to this warning there is even a huge button that reads "Enable Content" that, you guessed it, enables macros.

Crooks didn't notice this change at first, but they eventually caught on, and here we are today, in the second age of macro malware, two decades after it was almost eradicated.

UI & UX design has a role in everything, and it sure had an impact on the malware scene.
With no visible and informative message, users returned to their old habit of enabling macro scripts in order to view the file's content, a common explanation used by malware coders.

If you still think macro malware is not a potent threat, just search our website for the term, and you'll see almost weekly reports on a new malware family employing this technique to distribute, or some cyber-espionage group targeting its victims with malicious Office docs.

US-CERT Australia has a collection of recommendations regarding macro malware security.

1202b3805a810a0507a0f21fdff96e94.png

Macro script notification in Office 2010


Source:
http://news.softpedia.com/news/how-...ed-macro-malware-make-a-comeback-505077.shtml
 
I saw the US-Cert alert on this and was a little confused. No doubt macro based malware is a concern now that badguys have become experts at exploiting users' gullibility. But to blame this on Word's UI? Is context information a function of the UI? I don't know but I do know that displaying this content is disabled by default. And that's a good thing.

This problem is, was, and always will be the user - always the weakest link in security. Users MUST STOP being "click-happy" on unsolicited downloads, attachments and links - including those to Word documents. If macros have been disabled by default and Microsoft puts a "Security Warning" message next the options to enable them, users need find out what the issue is before enabling them.

Users cannot be Penny on The Big Bang Theory and ignore the Check Engine light just because the car is still running.

Now I agree since socially engineered methods of malware distribution (where badguys attempt to trick gullible users into clicking links) being on the rise probably necessitates stronger warnings. But again, as the article points out, most macros are not malicious and can serve a very useful purpose. If you know and trust the source of the document, then it is safe to enable them. But AS ALWAYS if something is unsolicited, go with the defaults until you have proven the changing them is safe.

Also, I point out that Microsoft has not be sitting on their thumbs over this ether.

Microsoft Malware Protection Center, July 2015, Threat intelligence - Macro malware,

and,

New feature in Office 2016 can block macros and help prevent infection.

*****

BTW, that Softpedia article has a glaring discrepancy that was repeated here. There is no such thing as "US-CERT Australia". The United States does not own, run, or manage the "CERT Australia".
 
Back
Top