In response to Microsoft’s stronger security policies, cybercriminals have been forced to adjust their tactics, according to the recently released Threat Report by ESET. The report highlights several interesting findings that shed light on the evolving strategies employed by malicious actors.
Microsoft’s commitment to enhancing its security measures has prompted cybercriminals to explore alternative avenues and develop new techniques to exploit vulnerabilities. ESET’s research has uncovered these tactics, signaling a constant battle between cybercriminals and cybersecurity experts.
One of the key findings in the report is that cybercriminals have increasingly shifted their focus to exploiting vulnerabilities in Microsoft Office. With the operating system becoming more secure, these malicious actors have widened their scope to target popular productivity software, which is widely used by individuals and organizations alike.
The report highlights a significant rise in attacks leveraging malicious macros embedded within Office documents. By deceiving users to enable macros, cybercriminals gain unrestricted access to the target’s system, allowing them to deploy various types of malware undetected. This shift in tactics demonstrates the adaptability and determination of cybercriminals to exploit any weaknesses in users’ security habits.
Furthermore, the Threat Report reveals an increase in PowerShell-based attacks. PowerShell is a powerful scripting language integrated with Windows, commonly used by system administrators for automation tasks. However, cybercriminals have been leveraging this tool to execute malicious commands and malware downloads, capitalizing on its legitimate functionality to bypass traditional security measures.
Another noteworthy finding is the growing popularity of browser-based attacks. Cybercriminals have realized that web browsers offer a vast attack surface, making them an attractive target for exploitation. Through the use of malicious extensions, compromised websites, or drive-by downloads, these attacks aim to gain control over browsers and subsequently compromise the entire system. With the rapid adoption of cloud-based applications and services, this trend poses a significant threat to both individuals and organizations.
The ESET Threat Report further highlights the emergence of fileless malware techniques. Traditionally, malware required files on the victim’s system to persist and execute. However, cybercriminals have evolved their strategies to minimize their footprint, making attribution and detection more challenging. Fileless malware leverages trusted system tools, such as PowerShell, macros, or legitimate applications, to execute malicious code directly in memory, bypassing traditional antivirus solutions.
Despite these alarming trends, the report does provide some positive news. ESET’s research shows a decline in the overall number of indiscriminate malware infections. This reduction can be attributed to the increasing adoption of antivirus solutions, security awareness training, and enhanced security measures implemented by operating system vendors.
However, the Threat Report emphasizes that cybercriminals continue to evolve their tactics, and organizations must constantly adapt to the evolving threat landscape. It recommends a multi-layered approach to security, combining robust endpoint protection with regular patching, employee education, and proactive threat hunting.
As the battle between cybercriminals and defenders rages on, it is essential for businesses and individuals to remain vigilant and adaptable. By staying informed about the latest threats and adhering to cybersecurity best practices, both users and organizations can bolster their security posture and mitigate the risk of falling victim to cyber attacks.

