lolloj - Fotolia
Researchers at the SANS Internet Storm Center discovered that the Necurs botnet has been using what's known as a DDE attack to spread the Locky ransomware. What is a DDE attack, and what mitigation steps are available?
Attacks that exploit legitimate functionality in Microsoft Office and other programs continue to be successful as people accidentally enable these functions and allow malware to run on their endpoints.
The recent Necurs botnet attack was found running malicious code on an endpoint in Word via the Dynamic Data Exchange (DDE). During this attack, the malicious code tries to download additional malicious code in order to infect the endpoint with Locky ransomware.
The DDE attack occurs when users attempt to embed data into a Word document, which makes updating reports easier. This is a powerful functionality, as it can be abused to run malicious code on an endpoint.
The DDE attack works by allowing one application to access the data of another application; the other application can be a command-line script that executes the malicious code on the endpoint, but the end user will get a pop-up warning. The DDE attack is one of many ways that macro-less code execution can take place in Microsoft Office.
Steps to mitigate the unexpected functionality include having tools in place that block the initial phishing attacks, restricting access to the command line and only allowing approved executables to run on a system. Likewise, every process running on a system can be logged and searched through in order to identify infected systems. Perhaps removing some of the unneeded functionality could reduce the attack surface and prevent future attacks.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading
Cloud security providers need to play catch-up with the evolving advancements in cloud technology. Find out what the top CSPs offer today and which ... Continue Reading
Cloud security certifications serve to bolster security professionals' resumes and boost value to employers. Learn about the top certifications ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.