• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Malware

Malicious Excel Add-ins as New Intrusion Vectors

Exploring how APT hackers leverage Excel add-ins as a novel vector of intrusion in the dynamic world of cybersecurity.

Gert Van de VenbyGert Van de Ven
June 12, 2023
in Articles, Cybersecurity, Malware
0
Exploring how APT hackers leverage Excel add-ins as a novel vector of intrusion in the dynamic world of cybersecurity.

The landscape of cyber threats is ever-evolving. As organizations become more vigilant and enhance their defense mechanisms, threat actors adapt and innovate, constantly seeking new ways to breach systems. One such adaptation has emerged in the wake of Microsoft’s decision to block Visual Basic for Applications (VBA) macros in Office files downloaded from the internet. This move was a response to the widespread misuse of macros as a popular intrusion vector. However, it has inadvertently triggered a shift in the tactics employed by advanced persistent threat (APT) actors.

As reported by cybersecurity firm Cisco Talos, both APT actors and commodity malware families are now increasingly utilizing Excel add-in (.XLL) files as an initial intrusion vector. These add-ins, while useful for legitimate Excel users, have become an avenue for malicious code execution. This shift in attack vectors underscores the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. Let’s delve deeper into this phenomenon and understand its implications.

The Shift from Macros to Excel Add-ins

Understanding the Shift

Microsoft’s blockage of macros was aimed at preventing one of the most prevalent methods used by cybercriminals: weaponized Office documents delivered via spear-phishing emails. These documents would prompt victims to enable macros to view content, which in reality triggered the stealthy execution of malware. With this crucial attack vector effectively blocked, bad actors have begun experimenting with alternative infection routes. Excel add-ins, or XLL files, have emerged as a popular choice.

The Threat of XLL Files

Microsoft describes XLL files as a type of dynamic link library (DLL) that can only be opened by Excel. Users can receive these files via email and, despite anti-malware scanning measures, they may open them unaware of the potential for malicious code within. The threat posed by these files is significant. Cybercriminals are employing a mix of native add-ins written in C++ and those developed using a legitimate free tool called Excel-DNA.

History and Growing Popularity

While the usage of XLL files as an intrusion vector may seem like a new development, it’s been around for quite some time. The first documented malicious use of XLL dates back to 2017 when the China-linked APT10 group used it to inject a backdoor payload into memory. Since then, a number of other adversarial groups have followed suit, including TA410, DoNot Team, and FIN7. The use of XLL files to distribute malware like Agent Tesla and Dridex has seen a significant increase.

Future Trends and Vulnerabilities

Anticipating New Threats

As more users adopt newer versions of Microsoft Office, it is likely that threat actors will shift from VBA-based malicious documents to other formats like XLLs. They may also increasingly look to exploit newly discovered vulnerabilities to launch malicious code in the process space of Office applications. This shift in tactics underscores the adaptability of threat actors in response to changing cybersecurity measures.

The Case of Ekipa RAT

One example of a malware that has adapted its approach is Ekipa RAT. This remote access trojan started using XLL Excel add-ins, and in late 2022, it began leveraging Microsoft Publisher macros to infiltrate systems and steal sensitive information. Publisher files can contain macros that execute upon the opening or closing of the file, making them a viable attack vector.

The Risks with Publisher Files

It’s worth noting that Microsoft’s restrictions to hinder macros from executing in files downloaded from the internet do not extend to Publisher files. This oversight provides adversaries with another avenue to exploit for their phishing campaigns. The adaptability demonstrated by Ekipa RAT creators suggests that malware developers closely track changes in the security industry and adjust their tactics accordingly.

Conclusion

The emergence of malicious Excel add-ins as an initial intrusion vector is a stark reminder of the constant evolution of threats. The blockage of macros in Office files by Microsoft, while a necessary and effective measure, has led to an increase in the misuse of other file types. This dynamic calls for continuous vigilance, robust threat intelligence, and proactive defenses on the part of organizations.

Despite the sophistication of these attacks, awareness and preparedness remain crucial deterrents. End users must be educated about the risks associated with different file types, and organizations should ensure robust scanning of all incoming files. Additionally, restrictions on macros should be extended to include other Microsoft Office files to curb these novel attack vectors.

Ultimately, the use of Excel add-ins for malicious purposes underlines the adaptability and tenacity of threat actors. In response, the cybersecurity community must not only keep pace but stay one step ahead to anticipate and counter emerging threats.

Tags: APT HackersAPT10Cyber Threat LandscapeDoNot TeamEkipa RATExcel Add-insFIN7Intrusion VectorMacrosMicrosoft OfficePhishingTA410

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}