{"id":620,"date":"2015-07-09T19:02:56","date_gmt":"2015-07-09T19:02:56","guid":{"rendered":"http:\/\/zaf.web.id\/blog\/?p=620"},"modified":"2015-07-09T19:02:56","modified_gmt":"2015-07-09T19:02:56","slug":"email-malware-dengan-macros-di-microsoft-word","status":"publish","type":"post","link":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/","title":{"rendered":"Email Malware dengan Macros di Microsoft Word"},"content":{"rendered":"<p>Beberapa hari yang lalu ada email masuk yang berisi permohonan aplikasi <em>Internship<\/em> di perusahaan kami, sebetulnya biasa saja namun sedikit terkejut karena <em>applier<\/em>-nya kelihatannya bukan berasal dari Indonesia. Setahun terakhir ini kami memang menerima beberapa mahasiswa untuk program <em>Internship<\/em> di perusahaan kami, namun yang masuk hanya dari\u00a0program akademik wilayah NTB.<\/p>\n<figure id=\"attachment_624\" aria-describedby=\"caption-attachment-624\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-624 size-large\" src=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png?resize=660%2C244\" alt=\"Email Internship Malware\" width=\"660\" height=\"244\" srcset=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM.png?resize=1024%2C378&amp;ssl=1 1024w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM.png?resize=300%2C111&amp;ssl=1 300w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM.png?resize=619%2C229&amp;ssl=1 619w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM.png?w=1608&amp;ssl=1 1608w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><figcaption id=\"caption-attachment-624\" class=\"wp-caption-text\">Email Internship Malware<\/figcaption><\/figure>\n<p><!--more-->Beberapa saat saya perhatikan isi <em>email-nya<\/em> tidak ada yang menjelaskan secara detail fokus <em>internship-<\/em>nya dibidang apa, sangat global dan hanya menyertakan <em>attachment resume-<\/em>nya, sampai akhirnya saya baru sadar bahwa itu hanyalah <em>Phishing Mail<\/em> untuk menyalurkan <em>Malware<\/em> atau program jahat lainnya.<\/p>\n<p>Setelah mengetahui hal tersebut, iseng saya membuka <em>file attachment<\/em> tersebut. Saya kira\u00a0tidak ada masalah karena format <em>file<\/em> tersebut hanyalah <strong><em>Microsoft Word<\/em><\/strong> (.doc) dan pikir saya tidak <del>mungkin<\/del> ada program jahatnya, ternyata saya salah.<\/p>\n<figure id=\"attachment_625\" aria-describedby=\"caption-attachment-625\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-625 size-large\" src=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM-1024x425.png?resize=660%2C274\" alt=\"Microsoft Word macro enabling for Malware\" width=\"660\" height=\"274\" srcset=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM.png?resize=1024%2C425&amp;ssl=1 1024w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM.png?resize=300%2C124&amp;ssl=1 300w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM.png?resize=619%2C257&amp;ssl=1 619w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.59.17-AM.png?w=1148&amp;ssl=1 1148w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><figcaption id=\"caption-attachment-625\" class=\"wp-caption-text\">Microsoft Word macro enabling for Malware<\/figcaption><\/figure>\n<p>Duh <em><strong>Macro<\/strong><\/em>? Ah ternyata dari sini mereka berniat masuk, dengan <em>macro<\/em> mereka punya akses ke sistem untuk melakukan berbagai hal seperti akses <em>database<\/em> kemudian mengirim data tersebut ke <em>si-attacker<\/em> dan banyak lainnya, tentu saja selama <em>macro <\/em>di-<em>enable<\/em> oleh <em>user.<\/em><\/p>\n<p>Akhirnya saya klik <em><strong>Disable Macros<\/strong><\/em> dan yang muncul adalah&#8230;<\/p>\n<figure id=\"attachment_626\" aria-describedby=\"caption-attachment-626\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-626 size-large\" src=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM-1024x781.png?resize=660%2C503\" alt=\"Microsoft Word Document macro Malware \" width=\"660\" height=\"503\" srcset=\"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM.png?resize=1024%2C781&amp;ssl=1 1024w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM.png?resize=300%2C229&amp;ssl=1 300w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM.png?resize=619%2C472&amp;ssl=1 619w, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.31-AM.png?w=1694&amp;ssl=1 1694w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><figcaption id=\"caption-attachment-626\" class=\"wp-caption-text\">Microsoft Word Document macro Malware<\/figcaption><\/figure>\n<p>Tidak ada informasi apapun isinya, hanya berisi peringatan (tipuan) kepada <em>user<\/em> untuk mengaktifkan <em>macro<\/em> agar bisa melihat isi dokumen tersebut.\u00a0Btw teknik rekayasa <em>social engineering<\/em> yang bagus untuk melakukan serangan \ud83d\ude42<\/p>\n<p>Setelah itu saya coba <em>Googling<\/em> mengenai hal ini dan menemukan <a href=\"http:\/\/phishme.com\/ms-word-macros-now-social-engineering-malware\/\" target=\"_blank\">tulisan menarik<\/a> yang membahasa lebih rinci mengenai proses dan dampak yang ditimbulkan oleh malware ini.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beberapa hari yang lalu ada email masuk yang berisi permohonan aplikasi Internship di perusahaan kami,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2],"tags":[140,139],"class_list":["post-620","post","type-post","status-publish","format-standard","hentry","category-coretan","tag-malware","tag-microsoft-word"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah<\/title>\n<meta name=\"description\" content=\"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah\" \/>\n<meta property=\"og:description\" content=\"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/\" \/>\n<meta property=\"og:site_name\" content=\"Ahmad Zafrullah\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/23Pstars\" \/>\n<meta property=\"article:author\" content=\"http:\/\/www.facebook.com\/23Pstars\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-09T19:02:56+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png\" \/>\n<meta name=\"author\" content=\"Zaf\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@23Pstars\" \/>\n<meta name=\"twitter:site\" content=\"@23Pstars\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zaf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/\"},\"author\":{\"name\":\"Zaf\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#\\\/schema\\\/person\\\/ba4e955d59a1e6a8284857e74b14e5ed\"},\"headline\":\"Email Malware dengan Macros di Microsoft Word\",\"datePublished\":\"2015-07-09T19:02:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/\"},\"wordCount\":270,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#\\\/schema\\\/person\\\/ba4e955d59a1e6a8284857e74b14e5ed\"},\"image\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png\",\"keywords\":[\"malware\",\"microsoft word\"],\"articleSection\":[\"Coretan\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/\",\"url\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/\",\"name\":\"Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png\",\"datePublished\":\"2015-07-09T19:02:56+00:00\",\"description\":\"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#primaryimage\",\"url\":\"http:\\\/\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png\",\"contentUrl\":\"http:\\\/\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/email-malware-dengan-macros-di-microsoft-word\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Malware dengan Macros di Microsoft Word\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/\",\"name\":\"Ahmad Zafrullah\",\"description\":\"Work to Learn is better than Learn how to Work\",\"publisher\":{\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#\\\/schema\\\/person\\\/ba4e955d59a1e6a8284857e74b14e5ed\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/#\\\/schema\\\/person\\\/ba4e955d59a1e6a8284857e74b14e5ed\",\"name\":\"Zaf\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1\",\"width\":300,\"height\":300,\"caption\":\"Zaf\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/zaf.web.id\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/zaf.web.id\",\"http:\\\/\\\/www.facebook.com\\\/23Pstars\",\"https:\\\/\\\/x.com\\\/23Pstars\"],\"url\":\"https:\\\/\\\/zaf.web.id\\\/blog\\\/author\\\/zaf\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah","description":"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/","og_locale":"id_ID","og_type":"article","og_title":"Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah","og_description":"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).","og_url":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/","og_site_name":"Ahmad Zafrullah","article_publisher":"http:\/\/www.facebook.com\/23Pstars","article_author":"http:\/\/www.facebook.com\/23Pstars","article_published_time":"2015-07-09T19:02:56+00:00","og_image":[{"url":"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png","type":"","width":"","height":""}],"author":"Zaf","twitter_card":"summary_large_image","twitter_creator":"@23Pstars","twitter_site":"@23Pstars","twitter_misc":{"Ditulis oleh":"Zaf","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#article","isPartOf":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/"},"author":{"name":"Zaf","@id":"https:\/\/zaf.web.id\/blog\/#\/schema\/person\/ba4e955d59a1e6a8284857e74b14e5ed"},"headline":"Email Malware dengan Macros di Microsoft Word","datePublished":"2015-07-09T19:02:56+00:00","mainEntityOfPage":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/"},"wordCount":270,"commentCount":0,"publisher":{"@id":"https:\/\/zaf.web.id\/blog\/#\/schema\/person\/ba4e955d59a1e6a8284857e74b14e5ed"},"image":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#primaryimage"},"thumbnailUrl":"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png","keywords":["malware","microsoft word"],"articleSection":["Coretan"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/","url":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/","name":"Email Malware dengan Macros di Microsoft Word - Ahmad Zafrullah","isPartOf":{"@id":"https:\/\/zaf.web.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#primaryimage"},"image":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#primaryimage"},"thumbnailUrl":"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png","datePublished":"2015-07-09T19:02:56+00:00","description":"Teknik rekayasa social engineering menggunakan dokumen Microsoft Word dan Macros untuk menyisipkan program jahat dan menyalurkannya via Email (Phishing).","breadcrumb":{"@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#primaryimage","url":"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png","contentUrl":"http:\/\/zaf.web.id\/blog\/wp-content\/uploads\/2015\/07\/Screen-Shot-2015-07-01-at-8.58.50-AM-1024x378.png"},{"@type":"BreadcrumbList","@id":"https:\/\/zaf.web.id\/blog\/email-malware-dengan-macros-di-microsoft-word\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zaf.web.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Email Malware dengan Macros di Microsoft Word"}]},{"@type":"WebSite","@id":"https:\/\/zaf.web.id\/blog\/#website","url":"https:\/\/zaf.web.id\/blog\/","name":"Ahmad Zafrullah","description":"Work to Learn is better than Learn how to Work","publisher":{"@id":"https:\/\/zaf.web.id\/blog\/#\/schema\/person\/ba4e955d59a1e6a8284857e74b14e5ed"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zaf.web.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":["Person","Organization"],"@id":"https:\/\/zaf.web.id\/blog\/#\/schema\/person\/ba4e955d59a1e6a8284857e74b14e5ed","name":"Zaf","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/09\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1","url":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/09\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1","contentUrl":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/09\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1","width":300,"height":300,"caption":"Zaf"},"logo":{"@id":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/09\/zaf_auto_x2.jpeg?fit=300%2C300&ssl=1"},"sameAs":["http:\/\/zaf.web.id","http:\/\/www.facebook.com\/23Pstars","https:\/\/x.com\/23Pstars"],"url":"https:\/\/zaf.web.id\/blog\/author\/zaf\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1741,"url":"https:\/\/zaf.web.id\/blog\/mengenal-dan-mencegah-ransomware\/","url_meta":{"origin":620,"position":0},"title":"Mengenal dan Mencegah Ransomware","author":"Zaf","date":"Desember 12, 2019","format":false,"excerpt":"Ransomware merupakan jenis malware yang dapat melakukan enkripsi terhadap berkas dengan skema public-private key. Korban perlu membayar tebusan jika ingin berkasnya dikembalikan seperti semula.","rel":"","context":"dalam &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/zaf.web.id\/blog\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2019\/12\/ransomware.jpg?fit=976%2C549&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2019\/12\/ransomware.jpg?fit=976%2C549&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2019\/12\/ransomware.jpg?fit=976%2C549&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2019\/12\/ransomware.jpg?fit=976%2C549&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1954,"url":"https:\/\/zaf.web.id\/blog\/mitigasi-malware-di-web-server-dan-cara-membersihkannya\/","url_meta":{"origin":620,"position":1},"title":"Mitigasi Malware di Web Server dan Cara Membersihkannya","author":"Zaf","date":"November 23, 2022","format":false,"excerpt":"Malware selalu menjadi hal yang merepotkan. Umumnya pembuat malware tidak membuat malware untuk sekedar ajang pamer layaknya defacement. Malware dibuat demi tujuan yang lebih besar dan masif, dan biasanya tidak berjalan secara sendiri-sendiri melainkan menjadi sebuah network atau perkumpulan. Discovery Disuatu pagi tiba-tiba salah satu website yang kami kelola menunjukkan\u2026","rel":"","context":"dalam &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/zaf.web.id\/blog\/category\/security\/"},"img":{"alt_text":"Mencari induk malware","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2022\/11\/6.-cari-dan-hapus-file-ico.png?fit=795%2C241&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2022\/11\/6.-cari-dan-hapus-file-ico.png?fit=795%2C241&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2022\/11\/6.-cari-dan-hapus-file-ico.png?fit=795%2C241&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2022\/11\/6.-cari-dan-hapus-file-ico.png?fit=795%2C241&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":981,"url":"https:\/\/zaf.web.id\/blog\/serangan-adware-via-htaccess\/","url_meta":{"origin":620,"position":2},"title":"Serangan Adware via .htaccess","author":"Zaf","date":"Desember 17, 2016","format":false,"excerpt":"Bukan pertama kalinya beberapa server kami mendapatkan serangan dengan teknik yang berbagai macam jenis, bentuk, dan dampaknya. Pagi ini\u00a0sempat kaget karena semua website yang ada dalam server Gili Air\u00a0kami diarahkan ke situs iklan ketika diakses dari perangkat mobile. Saat ditelusuri ternyata semua file .htaccess nya telah disusupi semua, untuk mendeteksi\u2026","rel":"","context":"dalam &quot;Server&quot;","block_context":{"text":"Server","link":"https:\/\/zaf.web.id\/blog\/category\/server\/"},"img":{"alt_text":".htaccess malware inject","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2016\/12\/Screen-Shot-2016-12-15-at-5.34.42-PM-1024x680.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2016\/12\/Screen-Shot-2016-12-15-at-5.34.42-PM-1024x680.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2016\/12\/Screen-Shot-2016-12-15-at-5.34.42-PM-1024x680.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":484,"url":"https:\/\/zaf.web.id\/blog\/serangan-campaign-malware\/","url_meta":{"origin":620,"position":3},"title":"Serangan Campaign Malware","author":"Zaf","date":"Desember 18, 2014","format":false,"excerpt":"Hari ini dipenghujung tahun 2014 ini adalah hari paling merepotkan selama mengelola salah satu Cloud milik LRsoft.\u00a0Pasalnya server mendapat kado natal istimewa berupa malware yang menginfeksi 60 lebih website yang\u00a0ada didalamnya, sehingga ketika domain web tersebut diakses via browser akan muncul peringatan block halaman dari layanan Google seperti gambar dibawah:\u2026","rel":"","context":"dalam &quot;Server&quot;","block_context":{"text":"Server","link":"https:\/\/zaf.web.id\/blog\/category\/server\/"},"img":{"alt_text":"Block dari Google","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2014\/12\/malware-frommshead.php_.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2014\/12\/malware-frommshead.php_.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2014\/12\/malware-frommshead.php_.png?resize=525%2C300 1.5x"},"classes":[]},{"id":2067,"url":"https:\/\/zaf.web.id\/blog\/berburu-malware-di-server-linux\/","url_meta":{"origin":620,"position":4},"title":"Berburu Malware di Server Linux","author":"Zaf","date":"Mei 27, 2024","format":false,"excerpt":"Beberapa tahun terakhir sangat banyak website yang tiba-tiba didalamnya terdapat laman dengan kata kunci slot, judi, gacor, dan seterusnya. Ini umumnya diakibatkan kurangnya perhatian terhadap pengelolaan website. Seringnya menggunakan plugin atau template dari sumber yang tidak terpercaya membuat malware bisa dengan mudah memperbanyak diri. Beberapa bulan terakhir cukup aktif untuk\u2026","rel":"","context":"dalam &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/zaf.web.id\/blog\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/05\/Screenshot-2024-09-05-at-23.45.21.png?fit=1200%2C833&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/05\/Screenshot-2024-09-05-at-23.45.21.png?fit=1200%2C833&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/05\/Screenshot-2024-09-05-at-23.45.21.png?fit=1200%2C833&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/05\/Screenshot-2024-09-05-at-23.45.21.png?fit=1200%2C833&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2024\/05\/Screenshot-2024-09-05-at-23.45.21.png?fit=1200%2C833&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1034,"url":"https:\/\/zaf.web.id\/blog\/akses-akun-email-yandex-dari-gmail\/","url_meta":{"origin":620,"position":5},"title":"Akses akun email Yandex dari Gmail","author":"Zaf","date":"Februari 13, 2017","format":false,"excerpt":"Beberapa tahun terakhir saya kerap kali menggunakan layanan Yandex untuk keperluan host email dengan custom domain. Selain free (tentunya),\u00a0fasilitas yang diberikan juga tidak kalah bagusnya dengan Gmail. Mulai dari UI\/UX, security, CNAME, dan customization lainnya sejauh ini cukup memuaskan. Hari ini saya\u00a0memberikan layanan email ke tim LRsoft dengan domain @lrsoft.id,\u2026","rel":"","context":"dalam &quot;Coretan&quot;","block_context":{"text":"Coretan","link":"https:\/\/zaf.web.id\/blog\/category\/coretan\/"},"img":{"alt_text":"POP access Yandex mail","src":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2017\/02\/Screen-Shot-2017-02-13-at-1.25.08-PM.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2017\/02\/Screen-Shot-2017-02-13-at-1.25.08-PM.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/zaf.web.id\/blog\/wp-content\/uploads\/2017\/02\/Screen-Shot-2017-02-13-at-1.25.08-PM.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4zLnS-a0","_links":{"self":[{"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/posts\/620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/comments?post=620"}],"version-history":[{"count":2,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/posts\/620\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/posts\/620\/revisions\/627"}],"wp:attachment":[{"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/media?parent=620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/categories?post=620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zaf.web.id\/blog\/wp-json\/wp\/v2\/tags?post=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}