It’s 2017 and we are still enabling Macros in documents we receive via email! (Come on people!)
Anyways, there are still people out there who don’t believe a macro can be used this way, so here is a quick video you can show them.
In this short clip a user receives an email from Jerry.firstname.lastname@example.org, but you can clearly see it actually came from a gmail address, and it contains an Excel invoice attachment.
In this example we have Excel set to not allow Macros to run automatically, but we are aware that a lot of people don’t use this setting (you nut-cases!).
Notice that nothing happens until the Macro is enabled!
Don’t enable a macro unless you are 100% sure of what it is.
The Excel sheet contains a simple macro which opens IE and goes to a website. This demonstrates how easy it is for an attacker to use a macro to either install malware or ransomware. We have used this method in our demo as it is very quick and visual and seems to get the point across better than a more complicated example.