Macro VirusMelissaMacroVirus

A macro is a type of script that automates repetitive tasks in Microsoft Office applications (such as Word, Excel). Macros are a useful way to make some tasks perform more efficiently. Unfortunately, macro viruses perform the same functions as macros, but they tend to be harmful. For example in March 1999, the Melissa macro virus caused Microsoft to shut down the company's entire email service. Melissa spread rapidly and arrived as an attachment with the subject line "Important message from [name of someone]." The body text read, "Here is that document you asked for...don't show anyone else." If the recipient opened the attachment, the macro virus infected the computer and carried out a series of commands. Melissa was a fast-spreading virus, infecting more than 100,000 computers in the first few days. Macro viruses remain a threat today, but the good news is that the user must perform some action for the virus to be activated; therefore, educating users not to open the attachment is essential. Most modern operating systems and office suites do not automatically run macros, so the threat from macro viruses is reduced.


User Awareness and Information Security Training: Empowering the user is always the first line of defense. Diligent and educated users will automatically be wary of file attachments. While macro viruses require user intervention, giving permission for the code to run, social engineering tactics attempt to entice and trick the user into performing this step. Strong user awareness and training is paramount - users must be diligent and even a little fearful when it comes to email attachments.

Anti-Virus / Anti-Malware End-Point Protection: Not just for viruses, anti-virus software can also scan Microsoft Office file type attachments such as Word documents and Excel spreadsheets. There are many free anti-virus solutions for home users, for Windows, Linux and Macintosh computers. Regardless of the operating system you use, anti-virus is a must-have. This protection provides a second layer of defense, and will intervene if the computer user (or some background program process) attempts to execute or interact with a virus. Furthermore, anti-virus solutions typically quarantine the malicious program, placing it in an isolated location which can allow for further review by a technician or information security practitioner.