Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits Microsoft Office Flaw in Malware Attacks

APT28 Exploits Microsoft Office Flaw in Malware Attacks

Posted on February 3, 2026 By CWS

Key Points

  • APT28, a Russia-linked group, is leveraging a Microsoft Office vulnerability in targeted attacks.
  • The flaw, identified as CVE-2026-21509, is being used to deploy malware in Ukraine, Slovakia, and Romania.
  • Attack methodologies include social engineering and advanced evasion techniques.

Introduction to APT28’s Latest Campaign

The cyber threat group known as APT28 has been identified in a series of sophisticated cyberattacks exploiting a newly discovered vulnerability in Microsoft Office. This vulnerability, known as CVE-2026-21509, has a CVSS score of 7.8, indicating its high severity. The attacks, part of an operation named Neusploit, began on January 29, 2026, shortly after Microsoft released details about the flaw.

Targeting users in Ukraine, Slovakia, and Romania, APT28 utilized social engineering tactics to launch their attack. The strategy involved crafting deceptive documents in multiple languages, including English, Romanian, Slovak, and Ukrainian, aiming to exploit the loophole in Microsoft Office software.

Technical Breakdown of the Attack

The attack leverages a malicious RTF file to exploit the Microsoft Office vulnerability. This file serves as a conduit for two distinct malware droppers: MiniDoor and PixyNetLoader. MiniDoor, a C++-based DLL, is designed to exfiltrate emails from various folders to predetermined email addresses. This tool is believed to be a simplified version of an earlier malware known as NotDoor.

PixyNetLoader, on the other hand, initiates a more complex attack sequence. It employs COM object hijacking to establish persistence on the infected system, embedding additional components such as a shellcode loader and a cleverly disguised PNG image.

  • The shellcode loader’s primary function is to extract and execute embedded code hidden within the PNG image through steganography.
  • This covert action only proceeds if the malware detects it is not under analysis and is executed by the ‘explorer.exe’ process.

APT28’s Strategic Use of Covenant Framework

APT28’s attack chain culminates in deploying a Grunt implant from the open-source .NET COVENANT command-and-control framework. This approach mirrors aspects of a previous campaign, Operation Phantom Net Voxel, which Sekoia documented in 2025. Notably, the current attack replaces VBA macros with DLLs but retains techniques such as COM hijacking and string encryption.

In parallel, a report from the Computer Emergency Response Team of Ukraine (CERT-UA) has highlighted APT28’s exploitation of this vulnerability using Word documents. This campaign targeted over 60 email addresses linked to Ukrainian governmental authorities. Analysis shows that one of the documents was created on January 27, 2026, underscoring the organized nature of the operation.

Conclusion

APT28’s ongoing exploitation of the Microsoft Office vulnerability, CVE-2026-21509, underscores the persistent threat posed by state-sponsored cyber actors. Their sophisticated tactics and ability to adapt to new technical landscapes make them a formidable opponent in the realm of cybersecurity. Continued vigilance and timely updates to software are crucial in mitigating such threats.

Frequently Asked Questions

  • What is APT28?
    APT28, also known as UAC-0001, is a state-sponsored threat actor linked to Russia, known for its advanced cyber-espionage campaigns.
  • What is CVE-2026-21509?
    CVE-2026-21509 is a security feature bypass vulnerability in Microsoft Office with a high severity score of 7.8.
  • How does APT28 exploit this vulnerability?
    APT28 uses crafted RTF files to exploit the flaw, leading to the deployment of malware droppers like MiniDoor and PixyNetLoader.
  • Who are the primary targets of these attacks?
    The primary targets are users in Ukraine, Slovakia, and Romania, with a focus on governmental and strategic institutions.
  • What can organizations do to protect themselves?
    Organizations should ensure Microsoft Office is updated with the latest security patches and monitor for unusual network activity.
The Hacker News Tags:APT28, CERT-UA, Covenant Grunt, CVE-2026-21509, Cybersecurity, Malware, Microsoft Office, Operation Neusploit, Romania, Slovakia, social engineering, threat actor, Ukraine, Zscaler

Post navigation

Previous Post: Critical Hikvision Vulnerability Threatens Wireless Access Points
Next Post: Critical Apache Syncope Vulnerability Exposes User Sessions

Related Posts

Transforming Your Cybersecurity Practice Into An MRR Machine Transforming Your Cybersecurity Practice Into An MRR Machine The Hacker News
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The Hacker News
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks The Hacker News
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
FedRAMP at Startup Speed: Lessons Learned FedRAMP at Startup Speed: Lessons Learned The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark