We have already posted about DDEAUTO, but thought we’d show another one just as it’s slightly different.
If a document opens and you are greeted by a pop up of any kind, then I’d say 99 times out of a hundred, it’s going to be a malicious exploit and you should just close and delete the document immediately and run a full Anti-Virus scan with at least 3 different free scanners.
This is the new exploit which is everywhere at the moment.
It’s a little different to the typical Macro exploits which are normally used.
In general you will need to click on 2 pop ups to allow the exploit to run, however since writing this I have played around a bit more and managed to get it down to only one pop up.
The point here in this video however is to show that if you read what the pop up says, you should not be clicking on it in any circumstances.
It’s true that some documents are linked dynamically to keep all data in linked sheets up to date. However if you are using one of these you would normally know about it.
If you don’t normally use documents with linked data and you open one which asks you to allow linked data, don’t just click OK! If you know who sent it, ask them what it is, and if you don’t know where it came from you probably should even be opening the attachment in the first place!
Then after clicking yes to the first pop up, we receive a second one, this is generally where the exploit will run. Ours is very obviously named for the sake of this demonstration, but an attacker would be trying their best to disguise it.
We hope that by watching this video you will be a little bit more educated and perhaps won’t click on that pop up box if you receive one of these emails!
It’s 2017 and we are still enabling Macros in documents we receive via email! (Come on people!)
Anyways, there are still people out there who don’t believe a macro can be used this way, so here is a quick video you can show them.
In this short clip a user receives an email from Jerry.firstname.lastname@example.org, but you can clearly see it actually came from a gmail address, and it contains an Excel invoice attachment.
In this example we have Excel set to not allow Macros to run automatically, but we are aware that a lot of people don’t use this setting (you nut-cases!).
Notice that nothing happens until the Macro is enabled!
Don’t enable a macro unless you are 100% sure of what it is.
The Excel sheet contains a simple macro which opens IE and goes to a website. This demonstrates how easy it is for an attacker to use a macro to either install malware or ransomware. We have used this method in our demo as it is very quick and visual and seems to get the point across better than a more complicated example.
This starts with you receiving an email which asks you to click on the link. It could be a specially crafted email from an attacker to make you believe its from your bank, email provider, or perhaps your amazon account. You click on the link and all appears OK, you also have Facebook open (most people do, or a shopping site!) but what is happening in the background is that the attacker now has access to your browser (Firefox/Chrome/Internet Explorer) and has the ability to intercept all your login credentials. They can also craft popups which look like normal updates to tempt you into downloading something which can compromise your PC permanently, or trick you into logging into a website you are already logged into, and all without you knowing. You’ll also notice that the PC is running up to date anti virus in a fully patched Windows 7 machine.