I am not a security expert. The following is just a figment of my imagination.
I am recently seeing a lot of posts about xlls being used as a way to introduce a virus in a system, I am trying to understand if there is a way to address the following scenario or if my concerns are not valid.
We usually just add our certificate to the xll files. As I understand they remain unchanged during build process and the DNA file would have the information of the DLLs to be loaded. Now for an unpacked addin, a threat actor can just pick the xll, modify DNA and combine it with their dlls and distribute, and essentially excel would load without raising any red flags where the certificate is already trusted.
Because the xll is not at all modified and it solely relies on dna file to load dlls. Can this be done in a way where the build process could add the checksum of the dna file or the checksum of the dll files so that any tampering could break the signature to the xll or xll only loads dlls that are digitally signed with the same security certificate.
Or do we have a better way to deal with this scenario and this is already addressed?
thanks