{"id":270185,"date":"2016-06-09T17:43:09","date_gmt":"2016-06-09T22:43:09","guid":{"rendered":"http:\/\/itblog.lcisd.net\/?p=270185"},"modified":"2016-06-09T17:49:02","modified_gmt":"2016-06-09T22:49:02","slug":"increased-risks-from-macro-based-malware","status":"publish","type":"post","link":"https:\/\/itblog.lcisd.net\/?p=270185","title":{"rendered":"Increased Risks from Macro-Based Malware"},"content":{"rendered":"<div id=\"zone-content\" class=\"zone zone-content clearfix container-12\">\n<div id=\"region-content\" class=\"grid-9 region region-content\">\n<div class=\"region-inner region-content-inner\">\n<div id=\"block-system-main\" class=\"block block-system block-main block-system-main odd block-without-title\">\n<div class=\"block-inner clearfix\">\n<div class=\"content clearfix\">\n<article id=\"node-current-activity-6530\" class=\"node node-current-activity node-published node-not-promoted node-not-sticky author-cclark odd clearfix\">\n<footer class=\"submitted meta-text\">Original release date: June 09, 2016<\/footer>\n<div class=\"content clearfix\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>Microsoft Office applications use macros to automate routine tasks. However, macros can contain malicious code that can be used to exploit vulnerable systems. Recently, there has been a resurgence of malware that is spread via macros. Individuals and organizations should proactively secure systems against macro-based malware.<\/p>\n<p>Users and administrators are encouraged to review <a class=\"ext\" href=\"https:\/\/insights.sei.cmu.edu\/cert\/2016\/06\/who-needs-to-exploit-vulnerabilities-when-you-have-macros.html\">CERT&#8217;s article<span class=\"ext\"><span class=\"element-invisible\"> (link is external)<\/span><\/span><\/a> on the resurgence of macro exploitation and apply recommendations outlined in <a href=\"http:\/\/www.asd.gov.au\/publications\/protect\/Microsoft_Office_Macro_Security.pdf\">CERT Australia&#8217;s report <\/a>on macro security.<\/p>\n<p><a href=\"https:\/\/itblog.lcisd.net\/wp-content\/uploads\/2016\/06\/Who-Needs-to-Exploit-Vulnerabilities-When-You-Have-Macros.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">Who-Needs-to-Exploit-Vulnerabilities-When-You-Have-Macros<\/a><a href=\"https:\/\/itblog.lcisd.net\/wp-content\/uploads\/2016\/06\/Microsoft_Office_Macro_Security.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">Microsoft_Office_Macro_Security<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Original release date: June 09, 2016 Microsoft Office applications use macros to automate routine tasks. However, macros can contain malicious code that can be used to exploit vulnerable systems. Recently, there has been a resurgence of malware that is spread<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,15],"tags":[],"class_list":["post-270185","post","type-post","status-publish","format-standard","hentry","category-security","category-us-cert"],"_links":{"self":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/270185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=270185"}],"version-history":[{"count":3,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/270185\/revisions"}],"predecessor-version":[{"id":270190,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/270185\/revisions\/270190"}],"wp:attachment":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=270185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=270185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=270185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}