Aliases: No associated aliases
Windows Defender Antivirus detects and removes this threat.
This threat uses malicious Office documents using dynamic data exchange (DDE) to deliver PowerShell downloaders. It runs when a user clicks on a pop-up dialog box that appears in malicious Office documents.
To learn more about mitigating DDE attack scenarios, read .Microsoft Security Advisory 4053440
Windows Defender Exploit Guard blocks DDE-based malware using Attack Surface Reduction (ASR) rules. ASR is a component within Windows Defender Exploit Guard that provides enterprises with a set of built-in intelligence that can block the underlying behaviors used by malicious documents to execute attacks without hindering product operation. To learn more about Windows Defender Exploit Guard, read: . Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware
The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.
Use the following free software to detect and remove this threat:Microsoft
You should also run a full scan. A full scan might find hidden malware.
Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10.
Go to > > and make sure that your settings is turned .All settingsUpdate & securityWindows DefenderCloud-based ProtectionOn
Read to learn how to securely open Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields.Microsoft Security Advisory 4053440