?
Solved

The return of macro viruses

Posted on 2016-08-08
3
Medium Priority
?
25 Views
Last Modified: 2016-08-27
Macro viruses used to be widespread around 2003-2008. Then, they seemed to disappear.  Now it seems in the last year or two that they are back. What was the driver for this?
0
Comment
Question by:furuno
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 82

Accepted Solution

by:
David Johnson, CD, MVP earned 2000 total points (awarded by participants)
ID: 41747797
actually the largest growth has been in ransomware virus's as the payload. Anti-Virus detection is pretty good these days and a macro that can access .net runtime can be scanned forever and nothing untoward will be found. One must always be vigilant about any macro enabled document and ensure that it comes from a known safe sender or safe location. Macro Execution is disabled unless the file is from a trusted location and you have had a chance to 'enable macros'.. I've turned off script execution in adobe reader/acrobat for years by default for this reason as well. Not many pdf's need to execute scripting.

The last major macro virus was Melissa in 1999 and due to the security policies in effect at that date it was on a tear and Microsoft had to shut down incoming email to try and stem the tide.

Many experts here on EE will not run any macro enabled documents.
0
 
LVL 2

Author Comment

by:furuno
ID: 41747923
Thanks David for that helpful response.

"Anti-Virus detection is pretty good these days"

Why do you say that?
0
 
LVL 82

Expert Comment

by:David Johnson, CD, MVP
ID: 41772820
FWIW, the anti-virus community is pretty proactive and updates are daily or more often.  The problem being that most ransomware sends out unique payloads so the # of uniques is on the rise. Unfortunately this defeats signature based AV
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 16 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question