Excel flagged as corporate security weak spot

Microsoft's Excel spreadsheet program has become a primary target for hacking attacks, according to security experts recently interviewed by Redmond magazine.

In the last 12 months, for example, Symantec has identified at least six Excel vulnerabilities for which there were no patches. Microsoft notified users of the latest zero day vulnerability last month, and previously released a set of Excel patches in its July 2007 security bulletin.

"The increase in attacks in Excel are numerous and the application seems to be at the forefront of ushering in frequent application-level attacks that we're seeing more of now than ever," Symantec Security Response manager Ben Greenbaum told Redmond, which calls itself the "independent voice of the Microsoft IT community."

Don Leatham of Arizona-based Lumension Security commented: "Out of all the applications sitting on networks and desktops around the globe, Excel lends itself to be the most natural attack target because of its ubiquity in the corporate world."

As hacking attacks increased on Windows applications, Microsoft has put a lot of effort into strengthening security in the core operating system, but this focus has taken attention away from vulnerabilities in end-user applications such as Excel, according to the security experts.

Leatham likened alien Excel files to pornography and urged security administrators to tell users not to open such documents. "How often to you hear about IT staff telling people not to click on these documents and they still do?" he asked.

To minimize the risks, he advised setting Excel to disable automatic execution of macros and monitoring Group Policy Objects.

The response from the Excel MVPs and experts on the Daily Dose of Excel Web site was skeptical, with Juan Pablo Gonzalez linking the scare story to another current debate: "I guess this could probably used as another excuse to kill VBA in future versions of Excel (and Office)."

Jon Peltier pointed out that the article relied heavily on opinions from experts from companies that provided security services. "If they can convince their clients that problems exist, they can increase their revenues," he noted, outlining a classic IT industry "fear, uncertainty and doubt" marketing strategy.

Peltier's suggestion for minimizing malicious attacks was to use a virtual machine for Internet access, without anti-virus software. So far the only "infection" he has experienced has been from tracking cookies. "What the IT guys fear from letting users use Excel and VBA is the loss of control over those users," he added.

By John Stokdyk, technology editor for our sister site, AccountingWEB.co.uk

You may like these other stories...

Regulatory compliance, risk management and cost-cutting are the big heartburn issues for finance execs in the C-suite. Yet financial planning and analysis—a key antacid—is insufficient.That's just one of the...
Continuing its efforts to simplify accounting procedures, the FASB has issued a proposed Accounting Standards Update on customer fees paid in a cloud computing arrangement. The newly-proposed update (Intangibles—...
How are you planning? What tools do you use (or fail to use) for forecasting? PlanGuru is a business budgeting, forecasting, and performance review software company based in White Plains, N.Y. AccountingWEB recently spoke...

Already a member? log in here.

Upcoming CPE Webinars

Sep 9
In this session we'll discuss the types of technologies and their uses in a small accounting firm office.
Sep 10
Transfer your knowledge and experience to prepare your team for the challenges and opportunities of an accounting career.
Sep 11
This webcast will include discussions of commonly-applicable Clarified Auditing Standards for audits of non-public, non-governmental entities.
Sep 26
In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards. A dashboard condenses large amounts of data into a compact space, yet enables the end user to easily drill down into details when warranted.