Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

0
Medium
Malware
Published: Tue Feb 03 2026 (02/03/2026, 09:12:00 UTC)
Source: The Hacker News

Description

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three

AI-Powered Analysis

AILast updated: 02/04/2026, 09:35:06 UTC

Technical Analysis

The threat actor APT28 (aka UAC-0001), known for state-sponsored espionage, has been observed exploiting a recently disclosed Microsoft Office vulnerability identified as CVE-2026-21509. This vulnerability is a security feature bypass that allows an attacker to craft malicious Office files (specifically RTF documents) that, when opened, trigger the execution of malicious code without requiring macros or other user-enabled features. The exploitation was first observed shortly after public disclosure, indicating rapid weaponization. The attack campaign, named Operation Neusploit, targets users primarily in Ukraine, Slovakia, and Romania, leveraging social engineering lures in English and localized languages to increase success rates. The attackers employ server-side evasion by only delivering malicious payloads to requests originating from targeted geographies and with specific User-Agent headers, reducing detection risk. The attack chain involves two main droppers: one delivers MiniDoor, a C++ DLL designed to steal emails from multiple folders and exfiltrate them to hardcoded threat actor email addresses; the other delivers PixyNetLoader, a more complex loader that uses COM object hijacking for persistence and extracts shellcode hidden via steganography inside a PNG image. This shellcode loads a .NET assembly implant (Grunt) associated with the Covenant C2 framework, enabling remote control and further payload deployment. The malware remains dormant if executed in analysis environments or if launched by processes other than explorer.exe, demonstrating anti-analysis techniques. The campaign shares similarities with a previous APT28 campaign (Operation Phantom Net Voxel) but replaces VBA macros with DLL-based payloads, indicating evolution in tactics. CERT-UA reports confirm targeting of Ukrainian government email addresses, highlighting the espionage focus. The attack chain also involves WebDAV protocol usage to download additional malicious components, further complicating detection and mitigation.

Potential Impact

For European organizations, especially governmental and critical infrastructure entities in Ukraine, Slovakia, and Romania, this threat poses significant risks to confidentiality and operational security. The email-stealing MiniDoor DLL compromises sensitive communications, potentially exposing classified or strategic information. The deployment of the Covenant Grunt implant enables persistent remote access, allowing attackers to conduct prolonged espionage, lateral movement, and data exfiltration. The use of advanced evasion techniques and steganography complicates detection and incident response efforts. Organizations relying heavily on Microsoft Office are at risk of compromise through seemingly benign document interactions, increasing the attack surface. The targeting of central executive authorities in Ukraine suggests a focus on political and military intelligence, which could have broader geopolitical implications. The stealthy nature of the malware and its persistence mechanisms could lead to long-term undetected intrusions, undermining trust in IT systems and potentially disrupting critical services. Additionally, the attack vector via Office documents means that supply chain partners and contractors using Office products in these countries may also be at risk, amplifying the threat's reach.

Mitigation Recommendations

Organizations should immediately apply any available Microsoft patches addressing CVE-2026-21509 to eliminate the vulnerability. In the absence of patches, implement strict Office macro and active content restrictions, and disable RTF file preview in email clients to reduce exposure. Deploy advanced email filtering solutions capable of detecting and quarantining suspicious RTF documents, especially those originating from or targeting the affected countries. Implement network-level geofencing and User-Agent filtering to detect and block anomalous connections consistent with the attacker's evasion techniques. Employ endpoint detection and response (EDR) tools with capabilities to identify COM hijacking, DLL proxying, and steganography-based payloads. Conduct user awareness training focused on recognizing spear-phishing attempts in localized languages and the risks of opening unsolicited Office documents. Monitor network traffic for WebDAV protocol usage anomalies and unusual outbound SMTP traffic that could indicate data exfiltration. Establish robust incident response plans that include forensic analysis of Office document metadata and behavioral indicators associated with MiniDoor and PixyNetLoader. Finally, collaborate with national CERTs and threat intelligence providers to stay updated on emerging indicators of compromise related to this campaign.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html","fetched":true,"fetchedAt":"2026-02-04T09:33:13.772Z","wordCount":1247}

Threat ID: 6983125df9fa50a62f7d2aac

Added to database: 2/4/2026, 9:33:17 AM

Last enriched: 2/4/2026, 9:35:06 AM

Last updated: 2/7/2026, 2:59:29 AM

Views: 229

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats