PPSideLoader takes this concept and applies it specifically to PowerPoint. Attackers package a malicious DLL alongside a legitimate PowerPoint executable (or related component). When PowerPoint runs a slideshow, it looks for specific supporting files. If an attacker has placed a poisoned DLL in the same directory, PowerPoint will load it—granting the attacker code execution on the victim’s machine. Unlike macro-based attacks (which require the user to enable scripts), PPSideLoader relies on file system behavior and search order hijacking.

Here is everything you need to know about how it works, why it is dangerous, and how to stop it. PPSideLoader is a DLL sideloading attack that leverages Microsoft PowerPoint’s slide show mode. In a standard DLL sideloading attack, an attacker tricks a legitimate application into loading a malicious Dynamic Link Library (DLL) file instead of the legitimate one.

While the name sounds like a piece of malware, PPSideLoader is actually a —a specific method of sideloading malicious code using Microsoft PowerPoint files ( .pps or .ppsx ).