Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits Microsoft Office Flaw Targeting Europe

APT28 Exploits Microsoft Office Flaw Targeting Europe

Posted on February 5, 2026 By CWS

Russian cyber actors, known as APT28, are conducting a sophisticated cyber espionage campaign targeting key government and military sectors in Europe. These attacks focus on maritime and transport organizations within countries such as Poland, Ukraine, and Turkey.

Exploitation of Microsoft Office Vulnerability

APT28 is exploiting a critical vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw allows attackers to bypass defenses and execute harmful code on affected systems effortlessly. The attack begins with highly targeted spear-phishing emails, which are crafted to resemble urgent official communications.

These emails use geopolitical themes, such as alerts about weapons smuggling or military training invitations, to deceive recipients. Upon opening the malicious document, the exploit activates automatically without requiring user interaction, making it particularly effective against defense and diplomatic targets.

Rapid Deployment and Stealth Techniques

Analysts at Trellix discovered this malicious activity and noted the adversary’s rapid response, weaponizing the vulnerability within 24 hours of its disclosure. The attack documents contain embedded objects that use the WebDAV protocol to fetch external payloads from attacker-controlled servers, masking malicious traffic as legitimate web requests.

Upon exploiting the vulnerability, APT28 deploys custom malware, such as the “BeardShell” C++ implant and an Outlook backdoor named “NotDoor.” These tools enable persistent access, intelligence theft, and lateral movement within the victim’s network. The use of legitimate cloud services for command and control complicates detection further.

Advanced Evasion Tactics

The infection chain is designed for stealth and resilience, using multiple layers of obfuscation to evade security measures. After the initial breach, a loader retrieves an encrypted image file that contains hidden shellcode, executing the BeardShell backdoor directly in memory and avoiding detection by traditional antivirus solutions. The malware also employs anti-analysis techniques, such as timing checks, to evade security sandboxes.

APT28 also uses the legitimate cloud service filen.io to manage its command and control communications, blending malicious traffic with regular user data. Organizations are urged to apply emergency Office patches and restrict the WebDAV protocol. Implementing strict email filtering can also block initial attack vectors.

Stay informed with our latest updates by following us on Google News, LinkedIn, and X, and set CSN as your preferred source in Google.

Cyber Security News Tags:APT28, cloud services, CVE-2026-21509, cyber espionage, Cybersecurity, European agencies, Malware, Microsoft Office, spear-phishing, Trellix

Post navigation

Previous Post: Critical n8n Vulnerability Allows System Commands Execution
Next Post: DesckVB RAT 2.9: Advanced Threat with Modular Plugins

Related Posts

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News
Hackers Abusing GitHub Notifications to Deliver Phishing Emails Hackers Abusing GitHub Notifications to Deliver Phishing Emails Cyber Security News
Albemarle County Hit By Ransomware Attack Albemarle County Hit By Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Avoid Fake Traffic Ticket Sites Stealing Your Data
  • Cyber Espionage Group Targets 37 Nations’ Infrastructure
  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Avoid Fake Traffic Ticket Sites Stealing Your Data
  • Cyber Espionage Group Targets 37 Nations’ Infrastructure
  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark