Microsoft's JavaScript Update for Excel Is a Gift to Cryptominers

At Build 2018, Microsoft revealed a new JavaScript features that is supposed to add new functionality into Excel. However, it's also a gift for those who want to indulge in cryptomining schemes.

Larry Loeb, Blogger, Informationweek

May 11, 2018

3 Min Read

Microsoft announced at its Build 2018 conference this week -- and in a blog post -- that it was going to add custom functionality locally in Excel spreadsheets through JavaScript.

The idea here, according to Redmond, is that it will be used for functions such as calculating math operations (like whether a number is prime), bringing information from the web (like a bank account balance) or streaming live data (like a stock price).

That might be true, but a merry band of pranksters out in the wild haa already figured out how to make this pay off for them through cryptomining scheme. (See Cryptocurrency Crime: The Internet's New Wild West.)

Security expert Charles Dardaman wrote in his blog that he figured out a way to do exactly that.

(Source: Security Now)

(Source: Security Now)

Of course, Microsoft made it sort of easy to come up with JavaScript functions for Excel by publishing most of the steps to activate it.

Not only that, the company published several files on GitHub that are essential to it.

Dardaman outlines the simple edits that are necessary to glue everything together.

The Coinhive script is pathed as a "script src" in HTML as the first step. A wrapper is then specified as a function, and finally a JSON file for the actual miner function used inside Excel is outlined.

All three files need to be hosted on an accessible server -- a local server will do just fine.

An XML file that serves as a manifest for these hosted files must also be specified.

If all is done in this manner, the mining function will show up when Excel is opened. It can then be inserted into a cell, and then start running.

The function has persistence, so if the XLSX document with the inserted miner is reopened then the mining will activate.

While the Excel JavaScript custom functions feature is currently available in the Developer Preview edition of Office 365 for subscribers enrolled in the Office Insiders program, it can be assumed that it will be rolled out to all users over time.

The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

It seems reasonable to also assume that the setup for this sort of function will be much simpler as the general release date approaches. Some of the manual editing that now goes into establishing the JavaScript functionality will no doubt be unnecessary.

That means Joe User will be able to do this sort of thing on his own.

That worries Dardaman. As a matter of fact, his opinion is that JavaScript should be blocked from Excel in its entirety once this new version hits general release.

His fears are understandable, but there may be use cases for a JavaScript-enabled spreadsheet in the organization that would stop this kind of Draconian solution.

Unfortunately, we will need to take another look at the entire situation as the release date grows nearer, in order to come up with something that protects both the organization, as well as the user.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Read more about:

Security Now

About the Author

Larry Loeb

Blogger, Informationweek

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange. His first Mac had 128 KB of memory, which was a big step up from his first 1130, which had 4 KB, as did his first 1401. You can e-mail him at [email protected].

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights