Threat Landscape Dashboard - Campaigns

Assessing today's threats and the relationships between them

Operation APT28 DDE

10.00
7.00
Description:

The campaign uses a malicious Word document that leverages the Microsoft Office Dynamic Data Exchange (DDE) technique to bypass network defenses. Regardless whether macros are enabled, the use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim?s system.

Geographies:
  • WEOG
Sectors:
  • Government Facilities
Modified Date:

2017-12-15