Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits Microsoft Office Flaw Targeting Europe

APT28 Exploits Microsoft Office Flaw Targeting Europe

Posted on February 5, 2026 By CWS

Russian cyber actors, known as APT28, are conducting a sophisticated cyber espionage campaign targeting key government and military sectors in Europe. These attacks focus on maritime and transport organizations within countries such as Poland, Ukraine, and Turkey.

Exploitation of Microsoft Office Vulnerability

APT28 is exploiting a critical vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw allows attackers to bypass defenses and execute harmful code on affected systems effortlessly. The attack begins with highly targeted spear-phishing emails, which are crafted to resemble urgent official communications.

These emails use geopolitical themes, such as alerts about weapons smuggling or military training invitations, to deceive recipients. Upon opening the malicious document, the exploit activates automatically without requiring user interaction, making it particularly effective against defense and diplomatic targets.

Rapid Deployment and Stealth Techniques

Analysts at Trellix discovered this malicious activity and noted the adversary’s rapid response, weaponizing the vulnerability within 24 hours of its disclosure. The attack documents contain embedded objects that use the WebDAV protocol to fetch external payloads from attacker-controlled servers, masking malicious traffic as legitimate web requests.

Upon exploiting the vulnerability, APT28 deploys custom malware, such as the “BeardShell” C++ implant and an Outlook backdoor named “NotDoor.” These tools enable persistent access, intelligence theft, and lateral movement within the victim’s network. The use of legitimate cloud services for command and control complicates detection further.

Advanced Evasion Tactics

The infection chain is designed for stealth and resilience, using multiple layers of obfuscation to evade security measures. After the initial breach, a loader retrieves an encrypted image file that contains hidden shellcode, executing the BeardShell backdoor directly in memory and avoiding detection by traditional antivirus solutions. The malware also employs anti-analysis techniques, such as timing checks, to evade security sandboxes.

APT28 also uses the legitimate cloud service filen.io to manage its command and control communications, blending malicious traffic with regular user data. Organizations are urged to apply emergency Office patches and restrict the WebDAV protocol. Implementing strict email filtering can also block initial attack vectors.

Stay informed with our latest updates by following us on Google News, LinkedIn, and X, and set CSN as your preferred source in Google.

Cyber Security News Tags:APT28, cloud services, CVE-2026-21509, cyber espionage, Cybersecurity, European agencies, Malware, Microsoft Office, spear-phishing, Trellix

Post navigation

Previous Post: Critical n8n Vulnerability Allows System Commands Execution
Next Post: DesckVB RAT 2.9: Advanced Threat with Modular Plugins

Related Posts

INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News
OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection Cyber Security News
New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News
xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors Cyber Security News
Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark