VBA macros are still a prevalent method for delivering malware, and new obfuscation techniques make them difficult to detect. However, analysis and detection tools have also improved to address these challenges.
- VBA macros have been used for delivering malware since 1995, with a resurgence in recent years due to changes in Microsoft Office user interface
- New obfuscation techniques, such as VBA Stomping, make it difficult to detect malicious macros
- Tools such as olevba and ViperMonkey have been developed to analyze and detect malicious macros
- Advanced techniques, such as VBA Stomping and Excel and Macros, have been presented at conferences
- Detection and prevention of malicious macros is challenging, but tools such as Macro Raptor have been developed to identify suspicious keywords
- Anecdote: Examples of macro-based campaigns include Emotet, FD Code, Black Energy, and Olympic Destroyer
One example of a macro-based campaign is Emotet, a banking Trojan that has been active since 2014 and sends hundreds of thousands of phishing emails with macros every day. Another example is Olympic Destroyer, which used a macro as the initial intrusion vector for the attack on the Winter Olympics in 2018.