![]() While this defense is by no means bulletproof, it adds a much-needed layer of protection – which is why it’s not recommended that users disable it. Protected View actually makes this sort of attack more difficult by rendering the files you open read-only and disabling macros until you disable Protected View. ![]() ![]() You can notify us by filling out and submitting this form or if you have no other option by submitting this form back to us by mail. After you enable this option you can open documents from a network share. Once that is done, a macro in the file is activated, which downloads some sort of malware – probably a Remote Access Trojan – that infects and damages the user’s PC. To disable protected view in all Microsoft Office products you must perform the following steps for each program Excel PowerPoint etc. Few people are aware that such files can also be used as a vector of infection, so the chances of them downloading the file and opening it without much scrutiny are quite high. Most people are aware that they should not just download any suspicious-looking files off the internet, but this email just has an MS Office file attached to it. The target of an attack receives a fraudulent email whose content is set up to try and trick the target into downloading the email’s attachment. There are many examples of macro-driven malware attacks, but they all function pretty much identically.
0 Comments
Leave a Reply. |