Previous All Posts Next

NSA Exploited MS Word Macros for Surveillance

Posted: June 13, 2016 to Technology.

Tags: Compliance, Ransomware, Malware, Data Breach

There have been new revelations about the US government’s spy program thanks to a series of Edward Snowden’s emails to the NSA’s SIGINT Oversight and Compliance Division released due to a Freedom of Information Act request. We’ve warned people time and again how macros embedded within Word documents are a prime attack vector of hackers, well it turns out that not only does the NSA have macros enabled, they need them to function. In order to make sure the NSA’s spying met legal guidelines, such as targeting the right people and masking any American identities in reports, those reports are reviewed by Department of Justice and NSA compliance officers. The Hawaii office was having some difficulty because new security protocols that had compartmentalized that particular office’s network was keeping NSA headquarters from being able to read their reports. Snowden, who was working as a system administrator as a Dell contractor in the Hawaii Office of Information Sharing, was tasked with looking into the issue. What he found was that the Word macros used to mask the identities of Americans required the person to be able to access the network of the Hawaii office to view the report, but due to the security compartmentalization anyone outside of that office would be unable to gain access and therefore unable to read the documents. While this sort of inner office tech support may seem dull, it allows us a little bit of knowledge on the inner workings of the NSA, specifically that they use macros. Not only are macros the favorite way for hackers to initiate ransomware attacks, they have been recently used in spying and in an attack on Ukraine’s power grid. If you have them enabled the only thing it takes to get infected with malware is to open a document with malicious macros embedded in it. Ultimately, the NSA came up with a solution that was inherently more secure by having analysts save their reports in rich text format, eliminating macros altogether. One thing that probably helped shield the NSA from attack was that these reports were shared on the government’s internal secure network. The likelihood that anyone would introduce an external document is probably slim.

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Enterprise IT Solutions & AI Integration

From AI implementation to cloud infrastructure, PTG helps businesses deploy technology securely and at scale.

Explore AI & IT Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now