Malware Report

November 2017


Microsoft Office documents have always been a favourite way of cyber-attackers to deliver malware to users in the form of embedded macros, which will then run malicious code when the document is opened. These malicious documents are typically delivered as an email attachment.

Fortunately, over the years users have become aware of macro-based attacks and have learnt not to enable macros when prompted when they receive a document from an untrusted source. Email vendors are also aware of this issue and will often block or quarantine any emails which contain attachments with embedded macros.

Unfortunately, cyber-attackers have found another way that they can include embedded malicious code using Office documents, email or even a meeting request… 

It’s called DDE (Dynamic Data Exchange), and this feature, which is in a whole range of Microsoft Office products, including Word and Excel, can be legitimately used to embed objects such as pictures, charts and other documents within your document... 

To read the full report and to stay up-to-date with future alerts join our LinkedIn Group:

Cyber Threat Intelligence Watch Group: https://www.linkedin.com/groups/8635847

If you would prefer not to click on the link then simply search for our “Cyber Threat Intelligence Watch” Group in LinkedIn.

If you would prefer a copy of the whole report to be emailed to you directly then please send an email to [email protected].

We are currently recruiting for 1st Line Technical Apprentice, IT Technical Apprentice, Sales Support Administrator Find out more >