Warning message... Link to action
In MITRE's evaluation of EDR solutions, Windows Defender ATP demonstrated industry-leading optics and detection capabilities Read the blog: Insights from the MITRE evaluation
Aliases: No associated aliases
Windows Defender Antivirus detects and removes this threat.
This threat uses malicious Office documents using dynamic data exchange (DDE) to deliver PowerShell downloaders. It runs when a user clicks on a pop-up dialog box that appears in malicious Office documents.
To learn more about mitigating DDE attack scenarios, read Microsoft Security Advisory 4053440.
Windows Defender Exploit Guard blocks DDE-based malware using Attack Surface Reduction (ASR) rules. ASR is a component within Windows Defender Exploit Guard that provides enterprises with a set of built-in intelligence that can block the underlying behaviors used by malicious documents to execute attacks without hindering product operation. To learn more about Windows Defender Exploit Guard, read: Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware.
The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.