Malicious Macros Remain Highly Effective

Stu Sjouwerman | Nov 9, 2020

Malicious Macros Highly EffectiveMicrosoft Office documents with malicious macros are still one of the top choices for attackers of all skill levels, according to Craig Williams from Cisco Talos. On the CyberWire’s Research Saturday podcast, Williams explained that Talos has been monitoring a threat actor using a Trojan dubbed “PoetRAT” to target Azerbaijani government departments. The threat actor isn’t particularly sophisticated, but it’s been steadily improving its tradecraft since it was first spotted earlier this year. Even so, it’s continuing to rely on the relatively simple technique of using Word documents with malicious macros to trick users into installing malware.

“If you look at the way that they're crafting the Word documents that they use as the vector for this, they're impersonating official government documentations for the local government,” Williams said. “And we see that a lot. You know, we saw that with campaigns in North Korea, a couple in Russia. So it's a common technique, but it is a way that they can target a specific country, because if they want intelligence on officials in those regions, they're going to use the right letterhead, they're going to use the right context, and so that can give you a much more involved picture of who they're targeting, which then can give you some insight into why they're targeting those people.”

This technique is simple enough for any hacker to use, yet it’s employed by even the most advanced nation-state actors because it works so well.

“Now, there is still the very real fact that they're using a Microsoft Word document with a macro embedded in it,” Williams said. “Which unfortunately is still remarkably successful, right? I mean, this has been around for decades. It's something everyone should know and everyone should have mitigation strategies in place for, but unfortunately, what we can see here is at least this actor believes that his potential targets do not have those strategies in place.”

Williams concluded that even as this threat actor improves its operational security and other skills, it will continue relying on this simple social engineering trick for as long as people continue to fall for it.

“So, you know, you've got to realize that this is the type of thing – Word macros – that are probably the largest threat to most organizations,” he said. “Simplistic, well-known, functional attacks that, you know, yeah, they target the system a little bit, but mostly they target the people. And I would guess that probably right behind this is an email saying, ‘hey, click on this.’”

Whether the threat is crime or espionage, new-school security awareness training can give your organization an essential layer of defense by enabling them to thwart social engineering tactics.

The CyberWire has the story.

Discover Your Organization’s Phish-prone™ Percentage

Ninety-one percent of data breaches begin with spear phishing. Launch our Free Phishing Security Test for up to 100 users to uncover your team's vulnerability and see how your security posture stacks up against industry benchmarks.

Get Your Free Phishing Security Test

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.