WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Security Awareness – Threat Actors Don’t Waste Time Adapting to Alternative Attack Vectors After Microsoft (re) Blocks Office Macros
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Threat Actors Don’t Waste Time Adapting to Alternative Attack Vectors After Microsoft (re) Blocks Office Macros

Author: Jennifer Walker

Created: Thursday, July 28, 2022 - 18:58

Categories: Cybersecurity, Security Preparedness

After the Redmond giant’s decision to turn macros off, then on again, and now finally back off, it seems threat actors have already adopted alternative attack vectors to infect victims with malicious attachments. Prior to Microsoft’s decision, attackers favored spreading malware via phishing emails containing Office documents that executed when a macro was enabled. In a new report from Proofpoint, researchers tracked malicious campaigns between October 2021 and June 2022 and observed a shift to other methods of payload distribution. Specifically, threat actors use of archive and executable files such as ISOs, ZIPs, and RARs significantly increased. Moreover, the use of LNK files dramatically rose by 1,675 percent – threat actors behind Emotet and Qakbot are known to employ LNK files disguised as a Word document in their campaigns. Additionally, Proofpoint observed a large increase in the use of HTML attachments, with attackers employing the HTML smuggling technique to deliver a malicious file on the host system.

Microsoft’s decision to block macros by default should put a crimp in phishing attacks that rely on malicious attachments to infect victims. Where once it was relatively simple to trick a target into opening a recognizable Office document file type, users presented with less recognizable file types may not be so quick to click anymore. Members are encouraged to remind users to be wary of ALL attachments. Read more at BleepingComputer.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar