February 4, 2016 By Douglas Bonderud 2 min read

Macro malware was a big player in the malicious code market 20 years ago. According to SC Magazine, it’s now back at large thanks to a newly discovered Neutrino bot (also known as Kasidet) dropper looking to open backdoors and grab user data with memory scraping and browser-hooking malware. But why the sudden uptick in this outdated method? More importantly: How come it’s working so well?

What’s Old Is New Again

As noted by Dark Reading, the new Kasidet dropper uses Visual Basic for Applications (VBA) macros found in Microsoft Office to deliver its malicious payload. It all starts when users open the *.doc file attached to an unsolicited email, which prompts them to turn on macros.

Along with a nonsense document, however, they get a Neutrino infection that hooks into any browsers and includes point-of-sale (POS) RAM-scaping malware. Although Microsoft took steps to mitigate the use of macro malware — and things were relatively quiet for 15 years — in the last 18 months, this attack method has enjoyed significant growth, even with employees (hopefully) educated about the dangers of opening unsolicited emails.

It’s also worth noting that Kasidet’s creators have been busy upgrading their code. The original version included multiple distributed denial-of-service (DDoS) features, while the new offering comes with high-risk POS targeting. Simply put? What’s old is new again as malware-makers leverage finite user memories to spread a whole new set of macro malware.

Increasingly Sophisticated

A reliance on old infection methodologies doesn’t mean these malware-makers lack ingenuity. Consider a recent Graham Cluley blog post detailing another Neutrino infection attempt: There, the document in question seemingly came from a linked network printer simply delivering a scanned document.

It’s clever, especially in a network setting where users don’t know offhand the exact model number and type of printers used by every department. With seemingly legitimate email origins, it’s not hard to see why some employees are duped into opening the attachment and enabling the requested macros.

Business Solutions, meanwhile, pointed to a rise in not only macro attacks, but also fileless malware that loads directly into the memory space of specific functions, hides behind APIs or lurks in the system registry. Combined with effective macro malware spear phishing, the results can be devastating: Employees used to getting macro-laden documents from somewhat familiar addresses gladly open attachments that in turn drop POS scrapers or even harder-to-detect fileless infection vectors onto corporate networks.

Managing Macro Malware

This kind of macro madness won’t last forever. As businesses wise up and detection methods improve, malicious actors will modify their approach. In the interim, however, the return to old-school infection methods demands a similar replay of past-tense responses: If employees aren’t expecting a specific document, they should ignore or delete the email.

If uncertain, email the sender directly, and if it’s from a printer or scanner and wasn’t directly requested, notify IT. Bottom line? Macros are back, and companies need to micromanage email handling until malware-makers take their trade somewhere else.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today