There are other methods that attackers may use to execute code once the document is opened. Another approach is to use the Mouse click / Mouse over technique that involves executing a command when the user moves the mouse over a crafted object in PowerPoint.
This can be done by assigning the corresponding action to it, as follows:
The good news is that updated versions of Microsoft Office should have a protected view (read-only access) security feature enabled, which will warn a user about a potential external program's execution if the document came from an unsafe location. In this case, it will be all about social engineering—whether the attacker succeeds in convincing the victim to ignore or disable all warnings.
Finally, Dynamic Data Exchange (DDE) functionality can also be used to execute malicious commands. One way it can do this is by adding a DDEAUTO field with the command to execute, specified as...