{"id":53290,"date":"2016-10-18T11:45:04","date_gmt":"2016-10-18T18:45:04","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=53290"},"modified":"2025-06-03T21:28:48","modified_gmt":"2025-06-04T04:28:48","slug":"password-protected-attachment-serves-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/","title":{"rendered":"Password-Protected Attachment Serves Ransomware"},"content":{"rendered":"<p>Attacks by macro malware carrying ransomware are growing, as <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/teslacrypt-arrives-via-neutrino-exploit-kit\/\">we have recently reported.<\/a> Since early March we have seen macro malware using high-obfuscation algorithms to hide itself from static and traditional antimalware detection techniques. Macro malware continues to evolve and use new tricks to evade detection. In addition to these evasion <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/macro-malware-employs-advanced-sandbox-evasion-techniques\/\">techniques,<\/a>\u00a0McAfee Labs researchers have witnessed a new variant of macro malware. This version uses the password given in the email to open the malicious Word document. Password protection makes it harder to extract and scan the attachment for malicious code.<\/p>\n<p>McAfee Labs has previously <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/macro-malware-employs-advanced-obfuscation-to-avoid-detection\/\">blogged<\/a> about macro malware using high-obfuscation algorithms and several other layers of evasion to avoid detection. Previous variants have used fudging techniques such as virtual machine awareness, sandbox awareness, and others. The infection process follows this path:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53291\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png\" alt=\"1\" width=\"1558\" height=\"124\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10.png 1558w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10-300x24.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10-768x61.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10-1024x81.png 1024w\" sizes=\"auto, (max-width: 1558px) 100vw, 1558px\" \/><\/p>\n<p>Looking at the email body we can see that the attached document file is randomly named with a .dot extension and a document password is provided to open it. The email related to this spam looks like the following snippet:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53292\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2-8.png\" alt=\"2\" width=\"619\" height=\"511\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-8.png 619w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-8-300x248.png 300w\" sizes=\"auto, (max-width: 619px) 100vw, 619px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53293\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/3-7.png\" alt=\"3\" width=\"882\" height=\"572\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-7.png 882w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-7-300x195.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-7-768x498.png 768w\" sizes=\"auto, (max-width: 882px) 100vw, 882px\" \/><\/p>\n<p>Once the user provides the password to open the document, it prompts the user to \u201cenable editing and enable content to read content.\u201d If a user clicks &#8220;enable content,&#8221; macros will be enabled and will drop a malicious VBScript with a random name in %appdata%. We checked the hash on VirusTotal. This file has recently been submitted from several countries.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53294\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/4-9.png\" alt=\"4\" width=\"979\" height=\"521\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-9.png 979w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-9-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-9-768x409.png 768w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/p>\n<p>The macro and dropped VBScript both are highly obfuscated. Once deobfuscated, the VBScript downloads the encrypted payload with the file extension .jop. Next the payload is decrypted by a simple XOR operation. At first glance, it is difficult to guess the intentions of this VBScript. We further deobfuscated the code and found more readable strings. The obfuscated VBScript looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53295\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/5-11.png\" alt=\"5\" width=\"979\" height=\"401\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-11.png 979w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-11-300x123.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-11-768x315.png 768w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/p>\n<p>The obfuscation algorithm is not the same every time. For this variant we deobfuscated the content using a small Python script.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53296\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/6-3.jpg\" alt=\"6\" width=\"1187\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-3.jpg 1187w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-3-300x73.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-3-768x186.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-3-1024x248.jpg 1024w\" sizes=\"auto, (max-width: 1187px) 100vw, 1187px\" \/><\/p>\n<p>After deobfuscating, we found more readable strings\u2014notably the malicious URLs that download the payloads. Different URLs may be present in different VBScripts. Currently these URLs are inactive.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53297\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/7-7.png\" alt=\"7\" width=\"661\" height=\"100\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-7.png 661w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-7-300x45.png 300w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/p>\n<p>Malware authors uses different techniques to delay the execution of any suspicious functionality for a certain time. Generally sandbox systems monitor execution for a limited time, and in the absence of malicious activity classify a program as legitimate. Attackers uses techniques such as onset delay, stalling code, and extended sleep calls to delay the execution in sandbox environments. This variant delays execution by running cmd.exe with the parameter \u201cping 8.8.8.8 -n 250 &gt; nul,\u201d which pings the Google DNS server 250 times and ignores the results.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53298\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/8-3.jpg\" alt=\"8\" width=\"717\" height=\"118\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-3.jpg 717w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-3-300x49.jpg 300w\" sizes=\"auto, (max-width: 717px) 100vw, 717px\" \/><\/p>\n<p>The final payload is <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\">Cerber<\/a> ransomware, which encrypts the victim\u2019s machine.\u00a0We saw a spike in Cerber during week 41 (early October):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-53348\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/10-5.png\" alt=\"10\" width=\"480\" height=\"284\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-5.png 480w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-5-300x178.png 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Malware authors continue to advance their sandbox-evasion techniques and make security efforts difficult for antimalware products. McAfee advises all users to keep their antimalware products up to date. McAfee products detect the document file, VBScript, and final Payload as W97M\/Downloader, VBS.Downloader, and Ransomware-FUN! [Partial hash].<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Hashes<\/strong><\/h2>\n<p><em>Document files:<\/em><\/p>\n<ul>\n<li>7799b30cd33b7052701a2d8e91aeb99e (password: nOrCeBV)<\/li>\n<li>b7220f3455d92615f25b8d9eca94fefc (password: TfsMoS)<\/li>\n<li>2552fb9ba6dfc97168bccde23763fb81 (password: 4nHTvIM1)<\/li>\n<\/ul>\n<p><em>VBScript:<\/em><\/p>\n<ul>\n<li>7F86D6E9C030630EACE4952F25DE9364<\/li>\n<li>19C684BABFBEF9CA5C845492D5A0DE4F<\/li>\n<\/ul>\n<p><em>Cerber:<\/em><\/p>\n<ul>\n<li>4df4dfbcf17f2b1f5bcab6210c54c251<\/li>\n<\/ul>\n<h2><strong>References<\/strong><\/h2>\n<p><a href=\"https:\/\/blog.knowbe4.com\/manic-monday-the-massive-cerber-campaign-flooding-your-employees-inboxes\">https:\/\/blog.knowbe4.com\/manic-monday-the-massive-cerber-campaign-flooding-your-employees-inboxes<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,338,180],"coauthors":[3973],"class_list":["post-53290","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Password-Protected Attachment Serves Ransomware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password-Protected Attachment Serves Ransomware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-18T18:45:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T04:28:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1558\" \/>\n\t<meta property=\"og:image:height\" content=\"124\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Password-Protected Attachment Serves Ransomware\",\"datePublished\":\"2016-10-18T18:45:04+00:00\",\"dateModified\":\"2025-06-04T04:28:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png\",\"keywords\":[\"cybercrime\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\",\"name\":\"Password-Protected Attachment Serves Ransomware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png\",\"datePublished\":\"2016-10-18T18:45:04+00:00\",\"dateModified\":\"2025-06-04T04:28:48+00:00\",\"description\":\"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Password-Protected Attachment Serves Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Password-Protected Attachment Serves Ransomware | McAfee Blog","description":"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Password-Protected Attachment Serves Ransomware | McAfee Blog","og_description":"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-10-18T18:45:04+00:00","article_modified_time":"2025-06-04T04:28:48+00:00","og_image":[{"width":1558,"height":124,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-10.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Password-Protected Attachment Serves Ransomware","datePublished":"2016-10-18T18:45:04+00:00","dateModified":"2025-06-04T04:28:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/"},"wordCount":564,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png","keywords":["cybercrime","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/","name":"Password-Protected Attachment Serves Ransomware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png","datePublished":"2016-10-18T18:45:04+00:00","dateModified":"2025-06-04T04:28:48+00:00","description":"Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-10.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/password-protected-attachment-serves-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Password-Protected Attachment Serves Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=53290"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53290\/revisions"}],"predecessor-version":[{"id":215037,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53290\/revisions\/215037"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=53290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=53290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=53290"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=53290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}