Unfortunately, it seems that’s not the case – at least not for users of the Mac version of Microsoft Office.
As The Register reports, the CERT Coordination Center at Carnegie Melon University has warned that one of the countermeasures built into Office for Mac against malicious macros is defective.
Astonishingly, consumers and companies who believe they have protected their computers by configuring MS Office to “Disable all macros without notification” are actually opening themselves up to the possibility of being silently infected.
The problem, first uncovered by Netherlands-based security outfit Outflank and reported to Microsoft a year ago, is related to Microsoft Excel’s support for a legacy type of macros known as XLM or Excel 4.0 macros. Microsoft has previously encouraged users of XLM macros to migrate them to the latest version of Microsoft Visual Basic for Applications (VBA), but still supports the XLM format.
And that’s a problem – because Office 2011 for Mac does not properly warn users of the presence of XLM macros within SYLK files.
That would be bad enough, but when the “Disable all macros without notification” feature is enabled, the XLM macros are actually automatically executed without any warning or prompts being shown to the user.
Without enabling any macros, Outflank were able to trick Excel into running macro code:
“I did not yet enable macros but already some part of the macro got interpreted? Further looking into it, I noticed that the Sylk was opened with Excel 2011, instead of Excel 2016 which I also had installed.”
(Fully patched versions of Office 2016 and Office 2019 for Mac reportedly do correctly report the presence of XLM macros inside SYLK files.)
At the time of writing there is no officially released patch from Microsoft for vulnerable versions of Office for Mac, but you may choose to switch from “Disable all macros without notification” to the normally less secure “Disable all macros with notification”.
CERT additionally recommends considering blocking Sylk (.SLK) file attachments at your email gateway, although as Outflank claims that the threat still works if a boobytrapped .SLK file is renamed to be a usually-considered harmless .CSV (comma-separated values) file that may not be enough. Of course, none of this explains why Microsoft’s own quality control team didn’t spot this issue in the first place…"
This was cross-posted from Graham Cluley's blog with grateful acknowledgement, and a recommendation to subscribe to his newsletter.