Thursday, May 8, 2025
HomeMalwareHackers Abuse Excel 4.0 Macros to Deliver Malware such as ZLoader &...

Hackers Abuse Excel 4.0 Macros to Deliver Malware such as ZLoader & Quakbot

Published on

SIEM as a Service

Follow Us on Google News

The Excel 4.0 macros are being continuously adapted by the threat actors. recently experts have detected that hackers are abusing Excel 4.0 macros to spread ZLoader and Quakbot malware.

In a report, the cybersecurity researchers stated that Excel4 (XLM) macros are a legacy scripting language that was first launched in 1992. 

The analysts came to know about this malware through a survey of 160,000 Excel 4.0 documents between November 2020 and March 2021. After a proper investigation, they found that 90% of the document files were identified as malicious. 

- Advertisement - Google News

The Excel macros are quite old, but hackers are targetting them because it provides paths to access all the powerful functionalities like interaction with the operating system (OS).

Statistical Analysis & Data

However, to know all its key details, the experts have downloaded all the documented files of Excel up to November 2020, that consist of nearly 160,000, as we told earlier.

Among all the 160,000 documented files, the users found that 90% of the files have used Excel 4.0 (XLM) macros. But, if users encounter a document that generally contains XLM macros, then it confirms that its macro will be malicious.

According to the cybersecurity researchers, XLM macros are a legacy Office option, and consequently, it provides a small chance that the new documents would use them instead of more “modern” VBA macros.

Quakbot Specimen

After analyzing the malicious attack, the experts came to know that they are dealing with the Quakbot family. Security researchers have described further that the hackers behind Quakbot often distribute all their payloads in the form of an Excel document.

That’s why the hackers try to convince their targets to allow macros so that they can easily decrypt the content. However, the messages that the hackers send are quite convincing, and therefore most of the time, users fall for their trap.

Outcome

It’s not the first time hackers are abusing Excel 4.0; most of the hackers attack Excel to spread their malware in the whole system.

Moreover, the specialists came to know that the malware fooled the users into allowing macros with convincing messages, but they have also come with embedded files containing XLM macros.

However, these XLM macros download and execute a malicious second-stage payload retrieved from a remote server. That’s why the cybersecurity researchers affirmed that it is very important that Macros should get decrypted as soon as possible.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Turn the Tables: Scamming the Scammers in Telegram’s PigButchering Scheme

Cybersecurity specialists have devised an innovative approach to combat an emerging cybercrime called "PigButchering"...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...

New Attack Exploits X/Twitter Ad URL Feature to Deceive Users

Silent Push Threat Analysts have recently exposed a sophisticated financial scam leveraging a vulnerability...

Guess Which Browser Tops the List for Data Collection!

Google Chrome has emerged as the undisputed champion of data collection among 10 popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated new malware dubbed LOSTKEYS,...

Lampion Banking Malware Uses ClickFix Lures to Steal Banking Credentials

Unit 42 researchers at Palo Alto Networks, a highly targeted malicious campaign orchestrated by...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...