{"id":125621,"date":"2021-08-06T13:29:57","date_gmt":"2021-08-06T20:29:57","guid":{"rendered":"\/blogs\/?p=125621"},"modified":"2025-06-08T20:08:09","modified_gmt":"2025-06-09T03:08:09","slug":"xlsm-malware-with-macrosheets","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/","title":{"rendered":"XLSM Malware with MacroSheets"},"content":{"rendered":"<p>Written by: Lakshya Mathur<\/p>\n<p><span data-contrast=\"auto\">Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of 2020,\u00a0we saw adversaries using Excel 4.0 macros,\u00a0an\u00a0old technology,\u00a0to deliver payloads to their\u00a0victims. They were mainly using workbook streams\u00a0via the\u00a0XLSX file format.\u00a0In these\u00a0streams,\u00a0adversaries were able to enter code straight into\u00a0cells\u00a0(that\u2019s why they were called macro-formulas).\u00a0<\/span><span data-contrast=\"none\">Excel 4.0 also used API level functions like downloading a file, creation of files,\u00a0invocation of other processes like PowerShell,\u00a0cmd, etc.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the evolution of technology,\u00a0AV vendors started to detect these\u00a0malicious\u00a0Excel documents\u00a0effectively\u00a0and\u00a0so to have more obfuscation and evasion routines attackers began to shift to\u00a0the\u00a0XLSM file format. In the first\u00a0half\u00a0of 2021,\u00a0we have seen a surge of XLSM malware delivering different family payloads (as shown in below infection chart). In XLSM adversaries make use of\u00a0Macrosheets\u00a0to enter their malicious code directly into the cell formulas. XLSM structure is\u00a0the\u00a0same as XLSX,\u00a0but XLSM files support VBA macros which\u00a0are\u00a0more advanced technology of Excel 4.0 macros. Using these\u00a0macrosheets,\u00a0attackers were able to access powerful windows functionalities and since this technique is new and highly obfuscated it\u00a0can\u00a0evade many AV detections.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Excel 4.0 and XLSM\u00a0are both known to download other malware payloads\u00a0<\/span><span data-contrast=\"auto\">like\u00a0ZLoader,\u00a0Trickbot,\u00a0Qakbot,\u00a0Ursnif,\u00a0IcedID,\u00a0etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The above figure shows\u00a0the\u00a0Number of samples\u00a0weekly\u00a0detected by\u00a0the\u00a0detected name\u00a0<\/span><i><span data-contrast=\"auto\">\u201cDownloader-FCEI\u201d<\/span><\/i><span data-contrast=\"auto\">\u00a0which specifically targets XLSM\u00a0macrosheet\u00a0based malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">D<\/span><span data-contrast=\"none\">etailed<\/span><span data-contrast=\"none\"> Technical Analysis<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"none\">XLSM Structure<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">XLSM files are spreadsheet files\u00a0that\u00a0support macros. A macro is a set of instructions\u00a0that\u00a0performs a record of steps repeatedly. XLSM files are based upon Open XLM formats that were introduced in Microsoft Office 2007. These file types are like XLSX but in addition,\u00a0they support macros.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Talking about the XLSM structure when we unzip the\u00a0file,\u00a0we\u00a0see four basic contents of the file, these are shown\u00a0below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">_rels\u00a0contains the starting package-level relationship.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">docProps\u00a0contains the metadata of the excel file.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">xl\u00a0folder contains the actual contents of the file.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">[Content_Types].xml has references to the\u00a0XML\u00a0files present within the above folders.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">We will focus more on\u00a0the\u00a0\u201cxl\u201d\u00a0folder contents.\u00a0This folder contains all the excel file main contents like\u00a0all the worksheets, media files, styles.xml file, sharedStrings.xml file, workbook.xml\u00a0file,\u00a0etc. All these files and folders have\u00a0data related to different aspects of\u00a0the\u00a0excel file. But for XLSM files we will focus on one unique folder called\u00a0macrosheets.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These XLSM files contain\u00a0macrosheets\u00a0as shown in figure-2\u00a0which are nothing but\u00a0XML\u00a0sheet files\u00a0that\u00a0can support macros. These sheets are not available in other Excel file formats.\u00a0In\u00a0the\u00a0past\u00a0few\u00a0months,\u00a0we have seen a huge surge in XLSM file-type malware in which attackers store malicious strings hidden within these\u00a0macrosheets. We will see more details about such malware in this blog.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun BCX0 SCXW51466013\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW51466013\">To explain further how attackers use<\/span><span class=\"NormalTextRun BCX0 SCXW51466013\">s<\/span><span class=\"NormalTextRun BCX0 SCXW51466013\">\u00a0XLSM files we have taken a\u00a0<\/span><span class=\"NormalTextRun BCX0 SCXW51466013\">Qakbot<\/span><span class=\"NormalTextRun BCX0 SCXW51466013\">\u00a0sample with SHA 91a1ba70132139c99efd73ca21c4721927a213bcd529c87e908a9fdd71570f1e.<\/span><\/span><span class=\"EOP BCX0 SCXW51466013\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<h3><span class=\"TextRun SCXW77262629 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW77262629 BCX0\" data-ccp-charstyle=\"Subtle Emphasis\">Infection Chain<\/span><\/span><\/h3>\n<p><span data-contrast=\"none\">The infection chain for both Excel 4.0\u00a0Qakbot\u00a0and XLSM\u00a0Qakbot\u00a0is similar. They both downloads\u00a0dll\u00a0and execute it using rundll32.exe with\u00a0DllResgisterServer\u00a0as the export function.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">XLSM Threat Analysis<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">On opening the XLSM file there is an image\u00a0that\u00a0prompts\u00a0the\u00a0user to enable the content. To look\u00a0legitimate\u00a0and clean malicious actors use a very\u00a0official-looking template as shown below.<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\"> <span class=\"TextRun SCXW192863282 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192863282 BCX0\">On digging\u00a0<\/span><span class=\"NormalTextRun SCXW192863282 BCX0\">deeper,<\/span><span class=\"NormalTextRun SCXW192863282 BCX0\">\u00a0we see its internal workbook.xml file.<\/span><\/span><span class=\"EOP SCXW192863282 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/span><\/p>\n<p><span data-contrast=\"auto\">Now as we can see in the workbook.xml file\u00a0(Figure-5), there\u00a0is\u00a0a\u00a0total\u00a0of\u00a06 sheets and\u00a0their\u00a0state is hidden.\u00a0Also,\u00a0two cells\u00a0have\u00a0a\u00a0predefined name and one of them is\u00a0<\/span><b><span data-contrast=\"auto\">Sheet2323!$A$1\u00a0<\/span><\/b><span data-contrast=\"auto\">defined as\u00a0<\/span><b><span data-contrast=\"auto\">\u201c_xlnm.Auto_Open\u201d<\/span><\/b><span data-contrast=\"auto\">\u00a0which is\u00a0similar to\u00a0Sub\u00a0Auto_Open() as we generally see in macro files. It automatically runs the macros when\u00a0the\u00a0user clicks on Enable Content.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As we saw in Figure-3\u00a0on opening the file, we only see the enable content image. Since the state of sheets was\u00a0hidden, we can right-click on the main sheet tab and we will see unhide option there, then we can select each sheet to unhide it. On hiding the sheet and change the font color to red we saw some random strings\u00a0as seen in\u00a0figure 6.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW174508791 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW174508791 BCX0\">These<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">\u00a0hidden sheets contain malicious strings in\u00a0<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">an<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">\u00a0obfuscated manner. So, on\u00a0<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">analy<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">zing<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">\u00a0more we observed that sheets inside\u00a0<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">the\u00a0<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">macrosheets<\/span><span class=\"NormalTextRun SCXW174508791 BCX0\">\u00a0folder contain these malicious strings.<\/span><\/span><span class=\"EOP SCXW174508791 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Now as we can\u00a0in figure-7\u00a0different tags are used in this\u00a0XML\u00a0sheet file. All the malicious strings are present in two tags &lt;f&gt; and &lt;v&gt; tags inside &lt;sheetdata&gt; tags. Now let\u2019s look more in detail about these tags.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&lt;v&gt; (Cell Value) tags are used to store values inside the cell. &lt;f&gt; (Cell Formula) tags are used to store formulas inside the cell. Now in the above sheet &lt;v&gt; tags contain the cached formula value based on the last time formula was calculated. Formula cells contain formulas like \u201cGOTO(Sheet2!H13)\u201d, now as we can see here attackers can store different formulas while referencing cells from different sheets. These operations are done to produce more and more obfuscated sheets and\u00a0evade\u00a0AV signatures.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When\u00a0the user clicks\u00a0on the enable content button the execution starts from\u00a0the\u00a0Auto_Open\u00a0cell, after which each sheet formula will start to execute one by one. The final\u00a0deobfuscated\u00a0string is\u00a0shown below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here\u00a0the\u00a0<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/internet-explorer\/ie-developer\/platform-apis\/ms775123(v=vs.85)\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">URLDownloadToFIleA<\/span><\/a><span data-contrast=\"auto\">\u00a0API\u00a0is used to download the payload and the string \u201cJJCCBB\u201d is used to specify data types to call\u00a0<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/internet-explorer\/ie-developer\/platform-apis\/ms775123(v=vs.85)\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">the<\/span><\/a><span data-contrast=\"auto\">\u00a0API.\u00a0There are multiple URI\u2019s and from one of them,\u00a0the\u00a0DLL payload gets downloaded and saved as ..\\\\lertio.cersw. This DLL payload is then executed using rundll32. All these malicious activities\u00a0get\u00a0carried out using various excel based formulas like REGISTER, EXEC, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Coverage and prevention guidance:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">McAfee\u2019s Endpoint products detect this variant of malware\u00a0as\u00a0below:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The main malicious document with SHA256 (<\/span><span data-contrast=\"auto\">91a1ba70132139c99efd73ca21c4721927a213bcd529c87e908a9fdd71570f1e<\/span><span data-contrast=\"none\">) is detected as \u201c<\/span><b><span data-contrast=\"none\">Downloader-FCEI<\/span><\/b><span data-contrast=\"none\">\u201d\u00a0with current DAT files.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Additionally, with the help of McAfee\u2019s Expert rule feature, customers can\u00a0add a custom behavior\u00a0rule,\u00a0specific to this infection pattern.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Rule {<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0 Process {<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Include OBJECT_NAME { -v &#8220;EXCEL.exe&#8221; }<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0 }<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Target {<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Match PROCESS {<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Include OBJECT_NAME { -v &#8220;rundll32.exe&#8221; }<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Include PROCESS_CMD_LINE { -v &#8220;* ..\\\\*.*,DllRegisterServer&#8221; }<\/span><\/i> <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Include -access &#8220;CREATE&#8221;<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0}<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00a0\u00a0}<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">}<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">McAfee advises all users to avoid opening any email attachments or clicking any links present in the mail without verifying the identity of the sender. Always disable the Macro execution for Office files. We advise everyone to read our blog on these types of malicious XLSM files and\u00a0their\u00a0obfuscation techniques to understand more about the threat.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Different techniques &amp; tactics are used by the malware to\u00a0propagate,\u00a0and we mapped these with the MITRE ATT&amp;CK platform.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">T1064(Scripting): Use of Excel 4.0 macros and different excel formulas to download\u00a0the malicious payload.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Defense Evasion (T1218.011): Execution of Signed binary to abuse Rundll32.exe and proxy executes\u00a0the malicious code is observed in this\u00a0Qakbot\u00a0variant.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Defense Evasion (T1562.001): Office file tries to convince\u00a0a\u00a0victim\u00a0to disable security features by using a clean-looking image.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Command and Control(T1071): Use of Application Layer Protocol HTTP to connect to\u00a0the\u00a0web and then downloads the malicious payload.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Conclusion<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">XLSM malware has\u00a0been seen delivering many\u00a0malware\u00a0families.\u00a0Many major families like\u00a0Trickbot,\u00a0Gozi,\u00a0IcedID,\u00a0Qakbot\u00a0are using these XLSM\u00a0macrosheets\u00a0in high quantity to deliver their payloads.\u00a0These attacks are still evolving and keep on using various obfuscated strings to exploit various windows utilities\u00a0like rundll32, regsvr32, PowerShell, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Due to security concerns, macros are disabled by default in Microsoft Office applications. We suggest it is\u00a0only\u00a0safe to enable them when the document received is from a trusted source\u00a0and macros serve an expected purpose.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of 2020,\u00a0we saw&#8230;<\/p>\n","protected":false},"author":695,"featured_media":125690,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[180],"coauthors":[4136],"class_list":["post-125621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets<\/title>\n<meta name=\"description\" content=\"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets\" \/>\n<meta property=\"og:description\" content=\"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T20:29:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T03:08:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"XLSM Malware with MacroSheets\",\"datePublished\":\"2021-08-06T20:29:57+00:00\",\"dateModified\":\"2025-06-09T03:08:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\"},\"wordCount\":1341,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\",\"name\":\"XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg\",\"datePublished\":\"2021-08-06T20:29:57+00:00\",\"dateModified\":\"2025-06-09T03:08:09+00:00\",\"description\":\"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"XLSM Malware with MacroSheets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets","description":"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets","og_description":"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-08-06T20:29:57+00:00","article_modified_time":"2025-06-09T03:08:09+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"XLSM Malware with MacroSheets","datePublished":"2021-08-06T20:29:57+00:00","dateModified":"2025-06-09T03:08:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/"},"wordCount":1341,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg","keywords":["malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/","name":"XLSM Malware with MacroSheets | McAfee Blog XLSM Malware with MacroSheets","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg","datePublished":"2021-08-06T20:29:57+00:00","dateModified":"2025-06-09T03:08:09+00:00","description":"Written by: Lakshya Mathur Excel-based malware has been around\u00a0for decades\u00a0and\u00a0has been\u00a0in\u00a0the\u00a0limelight in recent years.\u00a0During the second half of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_AdobeStock_435606785-1.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/xlsm-malware-with-macrosheets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"XLSM Malware with MacroSheets"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/125621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=125621"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/125621\/revisions"}],"predecessor-version":[{"id":215299,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/125621\/revisions\/215299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125690"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=125621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=125621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=125621"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=125621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}