Macros and malware spooky.

Slides:



Advertisements
Similar presentations
Introduction to Macro Introduction to Visual Basic for Application Recording a Macro Looking at the code of Recorded Macro.
Advertisements

The Design Cycle Can you remember the order of the five steps? Use this simple game to find out! Click here to start Design Cycle Game by Steve Graham.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Tutorial 8: Developing an Excel Application
Save time with templates Create your own templates Say you often use a certain invoice whose basic content stays the same except for certain details that.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
VME2000 USB Token. The USB Token is a hardware device that plugs into a USB port (or a USB cable) on a laptop or PC. It can be used instead of a pass.
Customizing Word Microsoft Office Word 2007 Illustrated Complete.
Get up to speed A new file format One more big change in the new version of Word: an improved file format. What does that mean to you? The new file format.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Excel Lesson 14 Creating and Using Macros Microsoft Office 2010 Advanced Cable / Morrison 1.
By Andrew Noske My PowerPoint Macros.
Word Lesson 16 Working with Macros Microsoft Office 2010 Advanced Cable / Morrison 1.
Other Features Index and table of contents Macros and VBA.
Introduction to VBA. This is not Introduction to Excel We’re going to assume you have a basic level of familiarity with Excel If you don’t, or you need.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 CS 106 Computing Fundamentals II Chapter 17 “Introduction To VBA” Herbert G. Mayer, PSU CS status 6/30/2013 Initial content copied verbatim from CS 106.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Service Request Desk How we can help each other, help each other.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 RubyJax Brent Morris/
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
© Wiley Publishing All Rights Reserved. Automating Tasks with Macros Book VIII, Chapter 7…
Creating Macros in Excel Adding Automated Functionality to Excel & Office Applications.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Introduction to Microsoft Excel Macros COE 201- Computer Proficiency.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Windows XP File-Based Attacks Chris Dalbec & Chris Woodard.
©TechSavvyScience August 2013 techsavvyscience.blogspot.com Google Apps in Your Classroom.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
PDF Security Issues Doing your bit to help Betsy Kent May 2010.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Understanding and breaking the cyber kill chain
Intercept X Early Access Program Sophos Tester
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Ransomware 12:00 Juwan harris.
A lustrum of malware network communication: Evolution & insights
Baiting By Conan, Amy and Sarah.
Cyber Security By: Pratik Gandhi.
Detailed Info for Auto-Protect Feature of Norton Antivirus.
VoIP & Hosted PBX
Microsoft Access 2003 Illustrated Complete
Intercept X for Server Early Access Program Sophos Tester
Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Chap 10 Malicious Software.
Stopping Live Threats Ken Swain SE TN, GA, AL, MS Jan
Creating Macros in Excel
Ransomware in Web Apps OWASP Singapore.
Chap 10 Malicious Software.
PowerApps and Flow.
Malicious Program and Protection
Phishing 101.
Introduction to Internet Worm
Human Resource Management Software Demo
Cybersecurity Simplified: Ransomware
Presentation transcript:

Macros and malware spooky

whoami Niall Watson @Nige0x 4th year VP Slight alcoholic Malware Hater of big words

Macros Small programs within Office documents Used to automate repetitive tasks in office documents Can save you a lot of time Written in Visual Basic for Applications(VBA) Can use them maliciously

Macros as an infection vector Malware needs a way to infect a system Usual ways: Email USB Dodgy programs Macros now

Who uses these?

Who uses this method? Russian dudes Nation States Malware authors Dridex Cryptolocker Powersniff TeslaCrypt List goes on...

No point wasting exploits when you can use an MS office document Who would this target? Attack doesn't need to be complex Perfect to use against office workers Political activists Ukrainian power grid BlackEnergy No point wasting exploits when you can use an MS office document

How do they use them maliciously? Create a nice pretty document Nice pretty name, with made up data Code some malicious macros Send it to a bunch of users Hope some dumbass opens it

What happened? So the clever user has opened our nice document Clicked on enable content Voila they can see our nice employee wages. Oh no

Demo

Mitigations Turn off macros. Don't open unknown office docs Run through sandbox

Questions?