Malware embedded in document macros, typically in Microsoft Office files. When the user enables macros, the malicious code executes and can download additional payloads, steal data, or compromise the system.
Related Terms
Dropper
malwareA type of malware designed to deliver and install other malicious payloads onto a target system. Droppers often evade de...
Phishing
phishingA cyberattack that uses fraudulent emails, text messages, or websites to trick people into revealing sensitive informati...
Trojan
malwareMalware disguised as legitimate software that appears harmless but performs malicious actions when executed. Trojans oft...