Microsoft To Block Internet Macros By Default in Five Office Applications (therecord.media) 45
In one of the most impactful changes made in recent years, Microsoft has announced today that it will block by default the execution of VBA macro scripts inside five Office applications. From a report: Starting with early April 2022, Access, Excel, PowerPoint, Visio, and Word users will not be able to enable macro scripts inside untrusted documents that they downloaded from the internet. The change, which security researchers have been requesting for years, is expected to put a serious roadblock for malware gangs, which have relied on tricking users into enabling the execution of a macro script as a way to install malware on their systems. In these attacks, users typically receive a document via email or which they are instructed to download from an internet website. When they open the file, the attacker typically leaves a message instructing the user to enable the execution of the macro script. While users with some technical and cybersecurity knowledge may be able to recognize this as a lure to get infected with malware, many day-to-day Office users are still unaware of this technique and end up following the provided instructions, effectively infecting themselves with malware.
Why did it take so long? (Score:5, Insightful)
Why did it take so long? This has been a known issue for decades.
Re:Why did it take so long? (Score:4, Informative)
Interesting question. I think it sort of made sense for some spreadsheet contexts where only the latest results matter and you reasonably want the macros to update to the latest results every time the file is used. Having to confirm running the macros every time would be a nuisance in those situations.
But in general it has been a disastrous default (unless you're a malicious scammer, of course). There's a logical mismatch there. People tend to and even prefer to think of files as static objects, which is not true when the file is doing all sorts stuff without so much as a "By your leave".
Re:Why did it take so long? (Score:5, Informative)
Having to confirm running the macros every time would be a nuisance in those situations.
Eh? The current state is that you *will* be prompted before execution of macros from any document downloaded from Internet or received through a mail program. That's how it works now.
You need to unblock (remove the "from Internet" taint) the document before you can run macros. Until then, a document with the "internet taint" is also opened in a sandboxed version of the application (low integrity mode strips away writing permissions to the file system and more).
This change is that you will not be *prompted*. The macros will silently be blocked. No prompt. Which is better, because social engineering techniques can be deployed to make the target *want* to unblock the document.
Re: (Score:2)
The problem is that you may need those macros to run. At the same time the macro functionality is messed up and macros in frigging office documents can attack you.
Re: (Score:2)
Thanks for the clarification of the situation. I better clarify that I mostly avoid Microsoft documents whenever possible. Dare I say hearsay evidence swayed me? Most of my complicated macro programming goes WAY back.
Re: (Score:3, Informative)
I've got a few spreadsheets with macros that I share with members of a club. Now they will have to jump through all kinds of hoops to edit the document to remove the "internet taint" (which I assume will also apply to documents received by e-mail). Just great...
Why is it so difficult for MS to just restrict certain commands that could be dangerous? If a macro just rearranges cells, performs calculations, perhaps even downloads data from a website to certain cells, what's wrong with that? Just don't let it t
Re: (Score:2)
Re: (Score:2)
Put them in a self-extracting exe, that'll create safe practices.
Re: (Score:2)
Not really. Updating the things in the spreadsheet is one thing and not a malware-risk for the system. Writing the file-system or opening links in a browser or the like is quite another. MS fucked this up completely, plain and simple, and they have been refusing to fix it up until now. I expect somebody with enough clout threatened them.
Re: (Score:2)
This doesn't completely stop the malicious-writing-to-the filesystem problem, and it breaks macros that only update "the things in the spreadsheet", so I would say they are still refusing to fix it.
Re:Why did it take so long? (Score:4, Interesting)
Re:Why did it take so long? (Score:5, Insightful)
This is true with a small minority of users. Most users get lost as soon as the GUI changes. They get familiar with the new GUI and it starts all over again with the next release. It's unbelievable how many support calls I get with people in a panic because they blindly pressed OK. Yes these apps are ingrained and it is these apps that are the most likely avenue of infection.
All documents received from the Internet should require they be saved first and a user password entered in order to execute any script.
Now why am I complaining I make a killing on this?
Re: (Score:2)
All documents received from the Internet should require they be saved first and a user password entered in order to execute any script.
That is the wrong solution. Scammers will still get people to do that. The right solution is to restrict scripting in documents so that they cannot attack your system.
Re: (Score:2, Insightful)
Because PHB's complain when their crapWare doesn't work like they are used to, and they pay the MS bill. Money talks louder than sanity.
Re: Why did it take so long? (Score:3)
Re: (Score:1)
Yet another reason why I hope M$ NEVER offers their products on Linux.
Re: (Score:1)
Either the people who paid them to play dumb stopped paying, or someone outbid them.
Re: (Score:2)
Re: (Score:3)
Also, since the work server I'm connected to is technically using an IP address, does this mean that no macros will work on those documents? (Permissions do not allow me to make the Projects server a trusted location)
Brain fart (Score:2)
'Nuff said.
Trying to fix stupid (Score:2)
Re: (Score:2)
"Trusted locations" has been a setting for a long time. I expect an influx of support cases when they roll this out. I probably have a dozen or more business critical VBA solutions floating around out there, and likely a roughly equal amount of customers who did not listen when I mentioned that setting on delivery years ago.
Re: (Score:2)
Re: (Score:2)
Based on the flowchart in TFA, it doesn't look like that's relevant.
I wouldn't be surprised if they are, though. The solutions typically live in a database as templates, downloaded either via native desktop client or web interface for each use.
Re: (Score:2)
Re: (Score:2)
Blimey, right you are. That acronym has never entered my vocabulary and my brain appears to have just edited it out as meaningless. No worries then, presumably. The desktop client would have no reason to set that, and the web interface uses a plugin for document operations so presumably that would be fine as well.
Re: (Score:2)
I believe that macro-laden documents from the internet can still be saved-as to a trusted loc
Re: (Score:2)
Re: (Score:2)
Right-click the file and go to properties. Click Unblock. It's been that way for like 10 years. I have no idea why they have this Untrusted file concept and have not immediately gone to blocking Macros and everything else.
Re: (Score:2)
Right-click the file and go to properties. Click Unblock. It's been that way for like 10 years. I have no idea why they have this Untrusted file concept and have not immediately gone to blocking Macros and everything else.
Yea, I know that, but thanks. My concern was they somehow do away with that or make it much more difficult when you save as an Excel file with Macros..
Re: (Score:2)
Re:Trying to fix stupid (Score:4, Informative)
change from the click to turn off protected mode? (Score:2)
change from the click to turn off protected mode?
User Training (Score:2)
Re: (Score:2)
Re: (Score:3)
My son's place of work does that and he fell for it once. He was pretty embarrassed.
Now, if we could only do that to the president and owner of the company I work for. As far as I know, she is the only one who has infected our network by clicking on bad links and opening attachments to suspicious e-mails, and she's d
I bet they will mess it up (Score:3)
This move has been long overdue. The original inclusion of far too powerful scripting was a mess-up of epic proportions.
Bit I will be really surprised of this solves the issue. MS has a track record of doing the wrong thing, half-assing it and not understanding how its own software works. My predictions is that attackers will take less than a month to get around this limitation.
Not the real problem is not having some scripting ability in documents. PostScript and PDF both have that or rather the whole document format is a script. The real problem is that MS did not create a sandbox that prevents documents from infecting your machine.
Almost 22 f**king years before ... (Score:2)
Whistler to include 'block all unsigned apps' security mode [google.com]
Virus and Microsoft [google.com]
Microsoft has made $BILLIONS from their crap (Score:1)
Stockholm Syndrome has kept the money rolling in for Microsoft.
Office (Score:2)
20+ years too late.