The figures that show why Microsoft is so worried about Office macros

security
(Image credit: Shutterstock / binarydesign)

New ransomware figures from Venafi and Forensic Pathways have shed some light on to why Microsoft is currently so worried about the security of Office macros.

Over the course of five months (November 2021 to March 2022), the two companies analyzed 35 million dark web URLs, including marketplaces and forums for ransomware products and services, finding that almost all (87%) of the ransomware found on the dark web has been delivered to endpoints via malicious macros. 

The two companies identified a total of 30 different malware products, including Babuk, GoldenEye, Darkside/BlackCat, Egregor, HiddenTear, and WannaCry.

Macros as a ransomware launchpad

Not all ransomware was created equal, however. Those used in high-profile attacks cost more so, for example, the Darkside variant used in the Colonial Pipeline attack cost $1,262. Source code for popular ransomware is also relatively expensive, the researchers found, with Babuk’s source code going for $950, while Paradise’s sold for $593.

Macros are an important feature for every advanced Office user, as they allow the files to pull data from the web, automatically, and update the contents autonomously. Given the nature of the tool, it was being abused by threat actors for years, until Microsoft decided to prevent macro-carrying files downloaded from the internet from running in the first place.

“Given that almost anyone can launch a ransomware attack using a malicious macro, Microsoft's indecision around disabling of macros should scare everyone,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “While the company has switched course a second time on disabling macros, the fact that there was backlash from the user community suggests that macros could persist as a ripe attack vector.”

The findings, Venafi argues, are a strong argument for machine identity management control planes, which would drive specific business outcomes such as observability, consistency, and reliability. Code signing, it says, is a “key machine identity management security control” that helps eliminate macro-powered ransomware attacks. 

“Using code signing certificates to authenticate macros means that any unsigned macros cannot execute, stopping ransomware attacks in its tracks,” Bocek concludes. “This is an opportunity for security teams to step up and protect their businesses, especially in banking, insurance, healthcare and energy where macros and Office documents are used every day to power decision making.”

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
email
A Windows filetype update may have complicated cyber threat detection efforts
Latest in Security
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Google Chrome
Google Chrome security flaw could have let hackers spy on all your online habits
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Latest in News
Group of people meeting
Inflexible work policies are pushing tech workers to quit
A young woman is working on a laptop in a relaxed office space.
I’ll admit, Microsoft’s new Windows 11 update surprised me with its usefulness, providing accessibility fixes, a gamepad keyboard layout, and PC spec cards
Youtube
YouTube Premium could be getting a new time-saving perk, showing you recommended videos directly in your playback queue
inZOI promotional material.
inZOI has become the most wishlisted game on Steam, but I wouldn't get too caught up in the hype
Xbox Series X and Xbox wireless controller set to a green background
Xbox Insiders are currently testing a new Game Hub feature that looks useful, but I've got mixed feelings about it
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools