Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

Threat actors are finding their way around Microsoft’s default blocking of macros in its Office suite, using alternative files to host malicious payloads now that a primary channel for threat delivery is being cut off, researchers have found. The use of macros-enabled attachments by threat actors decreased about 66 percent between October 2021 and June 2022, according to new data by Proofpoint revealed in a blog post Thursday.

Read full article on Threat Post