Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Microsoft Confirms Temporary Rollback of Macro Blocking Feature

Microsoft has confirmed that the recent rollback of a feature related to the blocking of internet macros in its Office suite is only temporary.

Microsoft has confirmed that the recent rollback of a feature related to the blocking of internet macros in its Office suite is only temporary.

Since 2016, Office has been blocking macros in documents arriving from the Internet, displaying a yellow warning to the user, informing them that editing has been disabled and allowing them to enable editing – and thus macros – with a single click.

In January 2022, Microsoft announced that Excel 4.0 (XLM) macros would be restricted by default, and in February the tech giant changed the default Office behavior regarding macros: in documents arriving from the internet, users could no longer enable macros with a single click.

Specifically, Microsoft replaced the yellow notification with a new one to inform users that Visual Basic for Applications (VBA) macros in the document had been blocked. The notification also featured a “Learn more” button leading to an article containing information on the risks associated with macros.

Instead of allowing users to immediately enable macros, the article would explain that the Mark of the Web (MOTW) on documents arriving from the internet could be removed once the document was saved to a trusted location.

While the new default behavior was meant to prevent users from enabling potentially dangerous macros, Microsoft rolled back the change recently, to “improve user experience.”

An administrator working on a guideline for their employees noticed that Office was no longer displaying the new alert and commented on Microsoft’s February announcement to ask about the rollback.

As it turns out, Microsoft indeed had decided to roll back the feature, but said nothing about it, thus creating confusion.

Advertisement. Scroll to continue reading.

“Following user feedback, we have rolled back this change temporarily while we make some additional changes to enhance usability. This is a temporary change, and we are fully committed to making the default change for all users,” Microsoft notes in an update to the February announcement.

Administrators can still enable specific Group Policy settings to block macros in Office documents that arrive from the internet, the tech giant notes.

Microsoft wasn’t clear on when the new default will return to Office. The change affects Access, Excel, PowerPoint, Visio, and Word applications.

Related: Microsoft Ups Office Protections With Improved Blocking of Macros

Related: Researcher Details Sophisticated macOS Attack via Office Document Macros

Related: ZLoader Adopts New Macro-Related Delivery Technique in Recent Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed the new CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.