Published Feb 08, 2018|Updated Mar 05, 2018


Severe |Detected with Windows Defender Antivirus

Aliases: No associated aliases


Windows Defender Antivirus detects and removes this threat.

This threat uses malicious Office documents using dynamic data exchange (DDE) to deliver PowerShell downloaders. It runs when a user clicks on a pop-up dialog box that appears in malicious Office documents. 

To learn more about mitigating DDE attack scenarios, read Microsoft Security Advisory 4053440.

Windows Defender Exploit Guard blocks DDE-based malware using Attack Surface Reduction (ASR) rules. ASR is a component within Windows Defender Exploit Guard that provides enterprises with a set of built-in intelligence that can block the underlying behaviors used by malicious documents to execute attacks without hindering product operation. To learn more about Windows Defender Exploit Guard, read: Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.

Read our report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.



Latest news