Article Details

Original Article Text

Click to Toggle View

Microsoft announces plans to kill VBScript malware delivery. Microsoft is planning to phase out VBScript in future Windows releases after 30 years of use, making it an on-demand feature until it is removed. VBScript (also known as Visual Basic Script or Microsoft Visual Basic Scripting Edition) is a programming language similar to Visual Basic or Visual Basic for Applications (VBA) and was introduced almost 30 years ago, in August 1996. It comes bundled with Internet Explorer (which was killed off by Redmond across some Windows 10 platforms in February), integrates active scripting into Windows environments, and communicates with host applications through Windows Script. "VBScript is being deprecated. In future releases of Windows, VBScript will be available as a feature on demand before its removal from the operating system," the company said this week. "Initially, the VBScript feature on demand will be preinstalled to allow for uninterrupted use while you prepare for the retirement of VBScript." Features on Demand (FODs) are features within the Windows operating system like the .NET Framework (.NetFx3), Hyper-V, and the Windows Subsystem for Linux that aren't installed by default but can be added whenever necessary.  With the July 2019 Patch Tuesday cumulative updates, Microsoft also disabled VBScript by default in Internet Explorer 11 on Windows 10. One less malware infection vector Although not officially explained, Microsoft's decision to deprecate VBScript is likely tied to the earlier discontinuation of Internet Explorer this year. Fortunately, as a consequence, a prevalent infection vector employed by threat actors to infect Windows systems with malicious payloads has also been eliminated. This move is part of a broader strategy to mitigate the increasing prevalence of malware campaigns exploiting various Windows and Office features for infections. Malicious actors have used VBScript to distribute malware, including notorious strains like Lokibot, Emotet, Qbot, and, more recently, DarkGate malware, among others, onto victims' computers. The effort traces back to 2018 when Microsoft extended support for AMSI to Office 365 applications, curbing attacks that utilized VBA macros. Subsequently, Microsoft disabled Excel 4.0 (XLM) macros, introduced XLM macro protection, mandated default blocking of VBA Office macros, and began blocking untrusted XLL add-ins by default in Microsoft 365 tenants worldwide.

Daily Brief Summary

MALWARE // Microsoft Phases out VBScript to Curb Malware Infections

Microsoft plans to deprecate VBScript, an old programming language that has been used as a malware infection vector.

The company will make VBScript a 'feature on demand' in Windows before removing it entirely from the OS to allow for a smooth transition.

This decision aligns with Microsoft's previous move to discontinue Internet Explorer, which bundled VBScript.

The deprecation of VBScript also removes a common infection pathway used by cybercriminals to spread malware such as Lokibot, Emotet, Qbot, and DarkGate.

Microsoft's step towards phasing out VBScript is part of a larger strategy to counteract the rise of malware campaigns exploiting Windows and Office features. Previously, Microsoft had extended support for AMSI to Office 365 applications, disabled Excel 4.0 macros, mandated the blocking of VBA Office macros, and began blocking untrusted XLL add-ins by default.