Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Quick Howto: Extract URLs from RTF files, (Mon, Feb 9th)

0
Medium
Exploit
Published: Mon Feb 09 2026 (02/09/2026, 11:38:16 UTC)
Source: SANS ISC Handlers Diary

Description

Malicious RTF (Rich Text Format) documents are back in the news with the exploitation of CVE-2026-21509 by APT28.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/09/2026, 11:45:42 UTC

Technical Analysis

The threat involves malicious Rich Text Format (RTF) documents exploiting CVE-2026-21509, a vulnerability actively leveraged by the advanced persistent threat group APT28. These RTF files are often disguised with .doc extensions to deceive users into opening them. The vulnerability allows attackers to embed malicious content, including URLs and potentially executable payloads, within the RTF structure. The exploitation technique involves embedding malformed URLs and WebDAV UNC paths with unusual port notations (e.g., '@ssl' or '@80'), which may be used to bypass standard detection mechanisms or trigger specific behaviors in Microsoft Office applications. The analysis provided by Didier Stevens demonstrates how to extract these URLs using a combination of tools (rtfdump.py, strings.py, re-search.py) to parse the RTF files, decode embedded objects, and isolate indicators of compromise (IOCs). Although no known exploits are currently widespread in the wild, the presence of APT28 activity indicates a targeted threat with potential for espionage or data exfiltration. The attack vector relies on user interaction to open the malicious document, which then exploits the vulnerability to compromise the system. The lack of patch information suggests that mitigation may rely on detection and prevention strategies until official fixes are available.

Potential Impact

For European organizations, the exploitation of CVE-2026-21509 by APT28 poses a significant risk, especially for entities targeted by espionage campaigns such as government agencies, defense contractors, and critical infrastructure providers. Successful exploitation can lead to unauthorized code execution, enabling attackers to gain footholds within networks, steal sensitive information, or deploy additional malware. The use of obfuscated URLs and embedded WebDAV requests complicates detection, increasing the likelihood of successful compromise. Given the medium severity and the need for user interaction, phishing campaigns or spear-phishing emails remain the primary delivery method, which is a common attack vector in Europe. The impact on confidentiality and integrity is considerable, while availability impact is likely limited but possible if attackers deploy destructive payloads. Organizations with extensive use of Microsoft Office and RTF documents are particularly vulnerable. The threat also stresses the importance of monitoring document-based attacks and enhancing email security controls.

Mitigation Recommendations

European organizations should implement advanced email filtering to detect and quarantine suspicious RTF documents, especially those with deceptive extensions like .doc. Employ endpoint detection and response (EDR) solutions capable of analyzing document behavior and extracting embedded URLs for threat intelligence correlation. Regularly update Microsoft Office and related software to apply any available patches addressing CVE-2026-21509. Conduct user awareness training focused on recognizing phishing attempts involving document attachments. Utilize sandboxing technologies to safely open and analyze suspicious documents before delivery to end users. Implement network monitoring to detect unusual WebDAV or UNC traffic patterns, particularly those involving non-standard port notations. Develop and deploy custom YARA or Sigma rules to identify malformed URLs and embedded objects consistent with this exploit. Finally, maintain threat intelligence sharing with European CERTs and industry groups to stay informed about emerging exploitation techniques related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32692","fetched":true,"fetchedAt":"2026-02-09T11:45:27.040Z","wordCount":498}

Threat ID: 6989c8d84b57a58fa148ec42

Added to database: 2/9/2026, 11:45:28 AM

Last enriched: 2/9/2026, 11:45:42 AM

Last updated: 3/26/2026, 9:47:09 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses