Macro-Based Malware Threat Resurgence Warned: Adnel, Dridex Target Organizations
Organisations are warned about a resurgence of macro-based malware, with recent examples including Adnel and Dridex botnet. These threats are hidden within Microsoft Office documents attached to emails, making detection challenging. Employee training and document sanitisation are key defence strategies.
Attackers exploit users' trust by disguising malicious macros within seemingly innocuous Office files. They often use social engineering tactics to persuade users to enable macros, allowing the malware to download and run files on the target PC. This method, demonstrated by the Adnel malware, can bypass initial antivirus detection.
In 2015, G Data played a crucial role in combating macro-based threats. On January 23, they were the first to scan the Adnel malware, which was initially undetected by other antivirus engines. Two months later, G Data neutralised the threat by adding detection signatures and updating their software. This highlights the importance of continuous threat detection and response.
Trend Micro's Trend Labs have observed a rise in macro-based malware attacks, with the UPATRE malware being a prominent target. To prevent such attacks, organisations must design effective email security policies. The first step is employee training, teaching staff not to open suspicious attachments or enable macros from unknown sources.
Macro-based malware, such as Adnel and Dridex botnet, poses a significant threat to organisations. To mitigate this risk, companies should invest in employee training and implement document sanitisation measures. These strategies can neutralise both known and unknown macro-based threats, enhancing overall email security.
Read also:
- Belarus Launches First Accredited Cybersecurity Center
- UK Convicts Chinese Crypto Fraudster, Seizes $7.39B in Bitcoin
- Bridge the IT-Security Divide with Qualys VMDR for ITSM: A New Application to Streamline Your IT and Security Operations
- Italy passes AI legislation addressing privacy concerns, supervision, and kid-safe access