WPS Office acting as drive-by malware

Posted by Intelligent_Stay_628@reddit | sysadmin | View on Reddit | 8 comments

We've had a couple of users at my MSP report that, after they downloaded files created in WPS Office or visited its website, the WPS Office suite installed itself on their machine and set itself as default - without admin passwords/elevation, or even the user noticing at all until they tried to open another file of the same type. So far, the only Microsoft response I can see involves them just telling users to change the default app back again.

Has anyone else seen this, and if so, is there anything available to block it?