Microsoft DDE Works in Outlook Too
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
In the original attack users had to be socially engineered into opening malicious attachments. By putting the payloads into the email message body itself or directly into calendar invites, the likelihood of a recipient falling victim to the attack is increased greatly as the emails or invites only have to be opened for a payload to be executed.
Attachments, emails and calendar invites pop up two giveaway warning dialogues before executing a DDEAUTO attack; if you 'No' to either dialogue then the attack is prevented. If you click 'Yes' to the first, you will see another dialogue warning that a command is about to be run. Clicking 'Yes' will run the command. Currently there is no known mechanism to bypass these dialog boxes.
Threat updates
| Date | Update |
|---|---|
| 10 Nov 2017 |
Microsoft has released an advisory that provides information and guidance on securing or disabling DDE fields in Microsoft Office applications. |
Remediation advice
Mitigation:Remediation steps
Last edited: 17 February 2020 11:34 am