lolloj - Fotolia
Researchers at the SANS Internet Storm Center discovered that the Necurs botnet has been using what's known as a DDE attack to spread the Locky ransomware. What is a DDE attack, and what mitigation steps are available?
Attacks that exploit legitimate functionality in Microsoft Office and other programs continue to be successful as people accidentally enable these functions and allow malware to run on their endpoints.
The recent Necurs botnet attack was found running malicious code on an endpoint in Word via the dynamic data exchange (DDE). During this attack, the malicious code tries to download additional malicious code in order to infect the endpoint with Locky ransomware.
The DDE attack occurs when users attempt to embed data into a Word document, which makes updating reports easier. This is a powerful functionality, as it can be abused to run malicious code on an endpoint.
The DDE attack works by allowing one application to access the data of another application; the other application can be a command-line script that executes the malicious code on the endpoint, but the end user will get a pop-up warning. The DDE attack is one of many ways that macro-less code execution can take place in Microsoft Office.
Steps to mitigate the unexpected functionality include having tools in place that block the initial phishing attacks, restricting access to the command line and only allowing approved executables to run on a system. Likewise, every process running on a system can be logged and searched through in order to identify infected systems. Perhaps removing some of the unneeded functionality could reduce the attack surface and prevent future attacks.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and ... Continue Reading
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading