Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits Microsoft Office Flaw Targeting Europe

APT28 Exploits Microsoft Office Flaw Targeting Europe

Posted on February 5, 2026 By CWS

Russian cyber actors, known as APT28, are conducting a sophisticated cyber espionage campaign targeting key government and military sectors in Europe. These attacks focus on maritime and transport organizations within countries such as Poland, Ukraine, and Turkey.

Exploitation of Microsoft Office Vulnerability

APT28 is exploiting a critical vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw allows attackers to bypass defenses and execute harmful code on affected systems effortlessly. The attack begins with highly targeted spear-phishing emails, which are crafted to resemble urgent official communications.

These emails use geopolitical themes, such as alerts about weapons smuggling or military training invitations, to deceive recipients. Upon opening the malicious document, the exploit activates automatically without requiring user interaction, making it particularly effective against defense and diplomatic targets.

Rapid Deployment and Stealth Techniques

Analysts at Trellix discovered this malicious activity and noted the adversary’s rapid response, weaponizing the vulnerability within 24 hours of its disclosure. The attack documents contain embedded objects that use the WebDAV protocol to fetch external payloads from attacker-controlled servers, masking malicious traffic as legitimate web requests.

Upon exploiting the vulnerability, APT28 deploys custom malware, such as the “BeardShell” C++ implant and an Outlook backdoor named “NotDoor.” These tools enable persistent access, intelligence theft, and lateral movement within the victim’s network. The use of legitimate cloud services for command and control complicates detection further.

Advanced Evasion Tactics

The infection chain is designed for stealth and resilience, using multiple layers of obfuscation to evade security measures. After the initial breach, a loader retrieves an encrypted image file that contains hidden shellcode, executing the BeardShell backdoor directly in memory and avoiding detection by traditional antivirus solutions. The malware also employs anti-analysis techniques, such as timing checks, to evade security sandboxes.

APT28 also uses the legitimate cloud service filen.io to manage its command and control communications, blending malicious traffic with regular user data. Organizations are urged to apply emergency Office patches and restrict the WebDAV protocol. Implementing strict email filtering can also block initial attack vectors.

Stay informed with our latest updates by following us on Google News, LinkedIn, and X, and set CSN as your preferred source in Google.

Cyber Security News Tags:APT28, cloud services, CVE-2026-21509, cyber espionage, Cybersecurity, European agencies, Malware, Microsoft Office, spear-phishing, Trellix

Post navigation

Previous Post: Critical n8n Vulnerability Allows System Commands Execution
Next Post: DesckVB RAT 2.9: Advanced Threat with Modular Plugins

Related Posts

13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center 13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity Cyber Security News
15 Best Remote Monitoring Tools 15 Best Remote Monitoring Tools Cyber Security News
10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Breaking Down Silos Aligning IT and Security Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark