N
InsightHorizon Digest

What do macro viruses target

Author

Joseph Russell

Updated on March 29, 2026

A macro virus is a computer virus written in the same macro language as the software it infects — common victims include Microsoft Excel and Word. Because they target software rather than systems, macro viruses can infect any operating system.

What is macro attack?

A macro virus is a piece of malicious code written in the same macro language used in everyday applications, such as Microsoft Word, Excel, and Powerpoint. The attack code commonly hides in documents and spreadsheets and is activated as soon as you open the file.

What are the characteristics of a macro virus?

Macro viruses are encoded with the ability to spread – much like the way a virus infects a person, replicates itself, and spread to other people. A macro virus can replicate and install material on a computer without the user’s knowledge or consent.

Which virus spreads through word macros?

An example of a macro virus is the Melissa virus which appeared in March 1999. When a user opens a Microsoft Word document containing the Melissa virus, their computer becomes infected. The virus then sends itself by email to the first 50 people in the person’s address book.

How does a multipartite virus work?

A multipartite virus is a fast-moving virus that uses file infectors or boot infectors to attack the boot sector and executable files simultaneously. Most viruses either affect the boot sector, the system or the program files.

What programs are most affected by macro virus?

Any widely used program that uses macros will be particularly vulnerable to macro viruses. Popular programs that use macros heavily include Microsoft Word, Excel, PowerPoint, and other apps in the Microsoft Office suite. Microsoft Word, Excel, and PowerPoint are particularly vulnerable to macro viruses.

What is a macro in malware?

Macro malware hides in Microsoft Office files and is delivered as email attachments or inside ZIP files. These files use names that are intended to entice or scare people into opening them. They often look like invoices, receipts, legal documents, and more.

Who created the first macro virus?

Melissa Virus Melissa made history as the first macro virus with email worm trait and started spreading via email on March 26, 1999 infecting tens of thousands within hours.

Can macros contain viruses?

A macro virus is a computer virus written in the same macro language that is used for software applications, such as word processing programs. Microsoft Word and Excel are two examples of applications that feature powerful macro languages. The languages are embedded in documents.

Are macros safe?

Macros are essentially bits of computer code, and historically they’ve been vehicles for malware. Luckily, modern versions of Office contain security features that will protect you from macros. Macros are still potentially dangerous.

Article first time published on

Why do people make viruses?

Proving a point – Sometimes a computer expert will create a virus to prove that a certain process will work, or that a certain network can be penetrated, or that certain antivirus software is effective. This is often a reason given by academics who try to prove their points by actions instead of by theories.

How do polymorphic viruses work?

Polymorphic viruses are complex file infectors that can create modified versions of itself to avoid detection yet retain the same basic routines after every infection. To vary their physical file makeup during each infection, polymorphic viruses encrypt their codes and use different encryption keys every time.

Which file is mostly infected by virus?

File Virus File viruses are commonly found in executable files such as .exe, . vbs or a .com files. If you run an executable file that is infected with a file virus, it can potentially enter your computer’s memory and subsequently run your computer.

What is space filler virus?

CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus which first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives, and in some cases destroying the system BIOS.

What is a Trojan virus and what does it do?

Trojan viruses are a type of malware that invade your computer disguised as a real, operational programs. Once a trojan is inside your system, it can perform destructive actions before you even know it’s there.

What are the examples of macro virus?

A macro virus is defined as “a computer virus written in the same macro language used for software applications, such as word processors.” Microsoft Word and Excel are two examples of applications that feature powerful macro languages, which are embedded in documents so they run automatically when the documents are …

What are macro files?

A macro is an automated input sequence that imitates keystrokes or mouse actions. A macro is typically used to replace a repetitive series of keyboard and mouse actions and used often in spreadsheets and word processing applications like MS Excel and MS Word. The file extension of a macro is commonly .

What can macros be used for in Word?

In Word, you can automate frequently used tasks by creating and running macros. A macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. To save time on tasks you do often, bundle the steps into a macro.

What are rootkits used for?

A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.

Can DOC files contain viruses?

Use caution when downloading documents and templates attached to emails. They might contain macros-related viruses, which are designed to infect files like Microsoft Word documents. Once you download and open the attachment, the infection will spread, embedding itself in other documents on your computer.

Which type of virus was the famous Michelangelo virus?

Michelangelo is classified as a boot sector virus, a type of virus that infects the startup sectors of storage devices—usually the boot sector of a floppy disk or the master boot record (MBR) of a hard disk.

What is a logic bomb virus?

A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.

Can a PowerPoint contain a virus?

Files with macros make a convenient hiding place for viruses. A macro is a small program that forms part of Word documents (with DOC extensions), Excel spreadsheets (with XSL extensions) and PowerPoint presentations ( PPT or PPS extensions). As these macros are programs they can be infected by viruses.

Is the Melissa virus still around?

Common nameMelissaTypeMacro virusAuthor(s)David L. SmithOperating system(s) affectedWindows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP

Why are macros bad?

when defining macros for magic numbers, the compiler retains no type information for the defined values. This can cause compilation warnings (and errors) and confuse people debugging the code. when defining macros instead of functions, programmers using that code expect them to work like functions and they do not.

How do I disable macros?

  1. In your Excel, click the File tab > Options.
  2. On the left-side pane, select Trust Center, and then click Trust Center Settings… .
  3. In the left menu, select Macro Settings, choose Disable all macros without notification, and click OK.

Is it illegal to make a virus?

No, not in itself. Viruses can be created legally for educational or research purposes, and be experimented with freely on your own systems/networks. However, hacking is illegal, and if caught accessing systems/devices, networks, or data that isn’t yours, your actions CAN result in stiff legal penalties.

What is virus in simple words?

A virus is an infectious agent of small size and simple composition that can multiply only in living cells of animals, plants, or bacteria.

How are viruses created in nature?

Viruses may have arisen from mobile genetic elements that gained the ability to move between cells. They may be descendants of previously free-living organisms that adapted a parasitic replication strategy. Perhaps viruses existed before, and led to the evolution of, cellular life.

What are polymorphic virus and stealth virus?

A stealth virus is a virus that hides modifications it has made in files or boot sectors. A polymorphic virus, on the other hand, generates numerous mutated versions of itself, relying on the anti-virus tools’ inability to detect all instances of the virus. The ways these virus hide themselves are very interesting.

How do polymorphic viruses spread?

Polymorphic viruses are usually spread using standard cyberattack techniques including spam, phishing emails, infected websites or other malware. Some of the more notorious polymorphic viruses include Ursnif (also known as Gozi), a banking Trojan; Vobfus, a Windows worm virus; and Bagle, an email worm.