Dangerous Microsoft Word and Excel Documents that Contain Macro Viruses
Would you share this Article with others?
A few years ago Microsoft disabled Macro in Microsoft Office by default because of Macro viruses. Macro is a very powerful and productive tool for Microsoft Office because it helps users automate simple and complex tasks in Microsoft Office. But, this productive tool was misused by cyber-criminals, who realized that they could use it to download and infect their victims' computers with malware. So, due to this threat, Microsoft disabled Macro in Microsoft Office by default and gave users the ability to enable it, if the document that they are opening is a trusted one.
Microsoft Word or Excel Prompting a User to enable Macro via “Enable Content” or "Enable Editing"
How to Protect Yourself
If you are sent an unexpected email message with an attached Microsoft Word or Excel document, ask to open the document, and then ask to "Enable Content" or "Enable Editing" in order to view the content, please delete the document. Enabling Macro via "Enable Content" will run or execute the malicious code or Macro, which will download and install Trojan horse, viruses or other malware on your computer.
Once your computer has become infected, especially with a Trojan horse, the cybercriminals behind the email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.
Please note that Macro viruses also affect Microsoft Powerpoint.
If you were tricked into opening a malicious Microsoft Word or Excel document and enabling Macro or "Content", we recommend doing a full scan of your computer with the antivirus software installed on it. If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.
Click here for a list of email attachments you should never open, regardless of where they came from.
For a list of virus email messages, please click here.
Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.
Please share what you know or ask a question about this article by leaving a comment below. Check the comment section below for additional information, if there is any. Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: email@example.com. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search engine.
You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.
Comments, Questions, Answers, or Reviews
To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. Also, remember to keep comments, reviews, answers respectful.
Show More Comments (1)
Write Your Comment, Question, Answer, or Review
Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.