Office Macros|macro-document|office-macro|TargetCompany-decrypter|VBA-macros|VBAMacros-previous|VBAMacrosBlockedTrustBar
office-macro-1024x519|macro-document|office-macro|TargetCompany-decrypter|VBA-macros|VBAMacros-previous|VBAMacrosBlockedTrustBar

Microsoft to block internet macros by default in five Office applications

In one of the most impactful changes made in recent years, Microsoft has announced today that it will block by default the execution of VBA macro scripts inside five Office applications.

Starting with early April 2022, Access, Excel, PowerPoint, Visio, and Word users will not be able to enable macro scripts inside untrusted documents that they downloaded from the internet.

The change, which security researchers have been requesting for years, is expected to put a serious roadblock for malware gangs, which have relied on tricking users into enabling the execution of a macro script as a way to install malware on their systems.

In these attacks, users typically receive a document via email or which they are instructed to download from an internet website. When they open the file, the attacker typically leaves a message instructing the user to enable the execution of the macro script.

While users with some technical and cybersecurity knowledge may be able to recognize this as a lure to get infected with malware, many day-to-day Office users are still unaware of this technique and end up following the provided instructions, effectively infecting themselves with malware.

2022-02-macro-document.png

Dealing with this problem has been a thorn in Microsoft's foot since VBA macro scripts are often used inside companies to automate certain operations and tasks when opening certain files, such as importing data and updating content inside the document from dynamic sources.

Since the early 2000s, Microsoft has tried addressing this issue by showing a mild security warning in the form of a toolbar at the top of the document, but this warning also contained controls allowing users to execute the macro scripts.

2022-02-VBAMacros-previous.png

After this change will roll out to end users, this warning will change to show a red alert bar notifying the user that the document contains macros but which cannot be enabled for security reasons.

2022-02-VBAMacrosBlockedTrustBar.png

Microsoft announced its plans today in a blog post on its Tech Community portal. The blog post also contains a description of the logic that the five Office apps will follow when deciding if to allow or block the execution of macro scripts inside a document.

2022-02-VBA-macros.png

Microsoft said the decision to block VBA macros by default only affects Access, Excel, PowerPoint, Visio, and Word on Windows. Documents that contain VBA macros that have been created and obtained from inside an organization's trusted network will still be allowed to execute.

"The change will begin rolling out in Version 2203, starting with Current Channel (Preview) in early April 2022," Microsoft said today.

"Later, the change will be available in the other update channels, such as Current Channel, Monthly Enterprise Channel, and Semi-Annual Enterprise Channel."

The change will roll out to all Microsoft 365 customers and the OS maker said it also plans to backport the change to other Office versions, such as Office LTSC, Office 2021, Office 2019, Office 2016, and Office 2013.

Once completed, the move will impact the distribution of a large number of commodity malware strains, but also many financially and politically-motivated espionage campaigns; however, these operations will most likely continue using other techniques.

Previously, Microsoft also blocked the execution of Excel 4.0 (XLM) macro scripts after similar abuse from malware gangs.

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
No previous article
No new articles

Catalin Cimpanu

Catalin Cimpanu

is a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.