lolloj - Fotolia
Researchers at the SANS Internet Storm Center discovered that the Necurs botnet has been using what's known as a DDE attack to spread the Locky ransomware. What is a DDE attack, and what mitigation steps are available?
Attacks that exploit legitimate functionality in Microsoft Office and other programs continue to be successful as people accidentally enable these functions and allow malware to run on their endpoints.
The recent Necurs botnet attack was found running malicious code on an endpoint in Word via the Dynamic Data Exchange (DDE). During this attack, the malicious code tries to download additional malicious code in order to infect the endpoint with Locky ransomware.
The DDE attack occurs when users attempt to embed data into a Word document, which makes updating reports easier. This is a powerful functionality, as it can be abused to run malicious code on an endpoint.
The DDE attack works by allowing one application to access the data of another application; the other application can be a command-line script that executes the malicious code on the endpoint, but the end user will get a pop-up warning. The DDE attack is one of many ways that macro-less code execution can take place in Microsoft Office.
Steps to mitigate the unexpected functionality include having tools in place that block the initial phishing attacks, restricting access to the command line and only allowing approved executables to run on a system. Likewise, every process running on a system can be logged and searched through in order to identify infected systems. Perhaps removing some of the unneeded functionality could reduce the attack surface and prevent future attacks.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
New variants of popular botnets were found targeting IoT devices by Palo Alto Networks' Unit 42. Discover how these variants differ from their ... Continue Reading
Detected malware can now efficiently be tracked due to VirusTotal's enterprise version of its software. Discover what N-gram is and how it can be ... Continue Reading
A new Kronos banking Trojan variant was found to use process impersonation to bypass defenses. Learn what this evasion technique is and the threat it... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.