In December, one of our MDR customers was targeted by a spear phishing campaign.
The campaign utilized many tactics that are popular right now and, unfortunately, continue to be successful.
Emails were sent to numerous recipients across the organization in multiple different departments.
The emails contained Microsoft Word attachments with benign-sounding names like “Bio.doc” and “CRTechnical.doc”.
The emails themselves were simplistic and contained.
Upon opening the attachment, users were prompted to enable macros.
In general, if you ever receive a Microsoft Office document and when you open it, it prompts you to enable macros…STOP!
Before doing anything else with the document, contact the sender of the document and:
- Verify the sender did indeed send you the document; if you do not know the sender report or submit the email to your company’s security or IT department
- Verify the sender mailed you a document with embedded macros. If they didn’t or do not even know what a macro is, report or submit the email to your company’s cyber security or IT department
When a user enables such a macro, they give the file permission to run or execute code.
That code can contain all types of obfuscated malicious instructions and might look something like this: