DATA DOCTORS

The Microsoft Office productivity tool used in some ransomware attacks: Macros

Mar 19, 2022, 7:15 AM

(Photo Illustration by Igor Golovniov/SOPA Images/LightRocket via Getty Images)...

(Photo Illustration by Igor Golovniov/SOPA Images/LightRocket via Getty Images)

(Photo Illustration by Igor Golovniov/SOPA Images/LightRocket via Getty Images)

Q: What are macros in Microsoft Office and what makes them dangerous?

A: Macros are one of the oldest and most valuable tools in the computer world because they allow complicated instructions to be performed with a single command.

You can essentially record a long series of commands and save them to a shortcut for future execution to save time without having sophisticated coding skills.

If you use Microsoft Office, there are a myriad of useful macros that can be created in applications like Word and Excel, such as inserting company letterhead to an existing document or adding formatted tables into a spreadsheet.

Macros are especially useful when you have a series of repetitive commands that you often use in just about any productivity software program.

The specific instructions for creating macros varies by program, so the best way to learn how to do it is by going to the ‘Help’ menu in any program and searching for ‘create a macro’.

Malicious MacrosThis same powerful productivity tool can be used to create harmful results because malicious macros can be hidden in official-looking documents.

This time of year, there are lots of attempts to compromise users via official-looking tax documents that arrive via phishing email messages and can appear to be from the IRS, your employer or from a payroll company.

The underlying coding tools can be easily manipulated to hide malicious code that will automatically and silently run when you simply open the document or spreadsheet.

What makes this type of compromise especially dangerous is that it can execute the malicious code without the user ever seeing what is happening, which is why it’s one of the methods used to propagate ransomware attacks.

Ransomware needs time to go through your computer’s files and encrypt them in the background, so sneaking in silently is essential.There are also lots of websites that offer free macros that you can download to save time, which may sound tempting but should be avoided.  There is no easy way for a non-technical user to know if a macro is legitimate or dangerous so stick to creating your own.

Disabling Macros for SecurityIn the past, you had to manually disable macros to protect yourself, so if you are using a really old version of Office, search the ‘Help’ menu for ‘disabling macros’ in all of the programs you use.

In current versions of Office, the default setting disables macros with a notification to the user that will allow them to enable it, if they so desire.

This should only be done if you are certain that the document is from a trusted source, such as your own company’s corporate network or something that you created in the past.

If you don’t know what a macro is going to do, you should never enable it unless you can verify the contents.

If you share a computer with younger users or don’t have the need for any macros, you can ‘disable all macros without notification’ in the ‘Macro Setting’ of the ‘Trust Center’ in Microsoft Office so the ‘enable’ option never appears in the future.

Data Doctors

Moving your Cox email to Yahoo Mail? Learn about the transition process, from webmail access to ema...

Data Doctors

Data doctors: Beware of Cox to Yahoo email transition scams

Moving your Cox email to Yahoo Mail? Learn about the transition process, from webmail access to email client settings.

3 days ago

How to sync smartphones to Windows computers: Arizona tips...

Data Doctors

Tech tip for Arizonans: How to sync smartphones to Windows computers

Want to learn how to sync smartphones to Windows computers? This article from the Data Doctors explains which steps to take.

10 days ago

(Pexels photo)...

Ken Colburn, Data Doctors

Here’s what a Wi-Fi analyzer app is used for

Wi-Fi has become an essential utility for most homes and making sure the signal is adequate in high usage areas is key.

17 days ago

(Pexels File Photo)...

Data Doctors

Here are all of the pros and cons of HP’s All-In printer plan

Each brand tries to differentiate itself from the rest of the crowd by creating unique features and in HP’s case, the subscription model is their latest offering.

24 days ago

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

1 month ago

...

Sponsored Content by Sanderson Ford

3 new rides for 3 new road trips in Arizona

It's time for the Sanderson Ford Memorial Day sale with the Mighty Fine 69 Anniversary, as Sanderson Ford turned 69 years old in May.

Sponsored Articles

...

Day & Night Air Conditioning, Heating and Plumbing

Beat the heat, ensure your AC unit is summer-ready

With temperatures starting to rise across the Valley, now is a great time to be sure your AC unit is ready to withstand the sweltering summer heat.

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

Day & Night Air Conditioning, Heating and Plumbing

Day & Night is looking for the oldest AC in the Valley

Does your air conditioner make weird noises or a burning smell when it starts? If so, you may be due for an AC unit replacement.

The Microsoft Office productivity tool used in some ransomware attacks: Macros