Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch

APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch

Posted on March 2, 2026 By CWS

A critical zero-day vulnerability within Microsoft’s HTML framework, dubbed CVE-2026-21513, has been targeted by the cyber threat group APT28. This flaw enables attackers to bypass security protocols and execute arbitrary code with a high CVSS score of 8.8, posing a significant risk across all Windows versions.

Discovery and Analysis by Akamai

Akamai’s security team identified the exploitation of this vulnerability by APT28, a group linked to the Russian state, prior to Microsoft delivering a patch in February 2026. Utilizing PatchDiff-AI, a multi-agent artificial intelligence system, researchers pinpointed the root cause of the vulnerability.

The vulnerability stems from the ieframe.dll component, specifically within the function _AttemptShellExecuteForHlinkNavigate, which manages hyperlink navigation. Insufficient URL validation permits malicious input to reach code paths that invoke the ShellExecuteExW function, allowing unauthorized execution of both local and remote resources.

APT28’s Exploit Tactics

APT28 leveraged a malicious sample identified on VirusTotal, submitted on January 30, 2026. This sample, named document.doc.LnK.download, was linked to the group’s infrastructure. The exploit uses a crafted Windows Shortcut (.lnk) file with an embedded HTML file following the LNK structure.

Upon execution, the LNK file connects to a domain associated with APT28’s multi-stage attacks, wellnesscaremed[.]com. This technique manipulates trust boundaries using nested iframes and multiple Document Object Model (DOM) contexts, effectively bypassing security measures like the Mark of the Web and Internet Explorer Enhanced Security Configuration.

Mitigation and Security Measures

Microsoft addressed this vulnerability in their February 2026 Patch Tuesday update, implementing stricter validation for hyperlink protocols. This update ensures proper execution within the browser context, preventing direct calls to ShellExecuteExW.

Akamai has provided Indicators of Compromise (IOCs) to aid network defenders. These include specific file names, domain indicators, and MITRE techniques like T1204.001 and T1566.001. Organizations are urged to apply the latest security updates and remain vigilant against potential alternative delivery methods.

While APT28’s observed campaign utilized malicious .LNK files, any component embedding MSHTML could potentially trigger this vulnerability. Continuous vigilance and timely application of security patches remain crucial for protecting against such threats.

Cyber Security News Tags:Akamai, APT28, CVE-2026-21513, cyber attack, Cybersecurity, Exploit, malicious files, Microsoft, MSHTML, security patch, security update, threat intelligence, Vulnerability, zero-day

Post navigation

Previous Post: Google’s Quantum-Resistant HTTPS Initiative in Chrome
Next Post: Global Outage Disrupts Claude AI Services

Related Posts

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Cyber Security News
Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence Cyber Security News
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload Cyber Security News
Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Outage Disrupts Claude AI Services
  • APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch
  • Google’s Quantum-Resistant HTTPS Initiative in Chrome
  • Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser
  • US-Israel Cyber Operations Intensify Amid Iran Tensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Outage Disrupts Claude AI Services
  • APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch
  • Google’s Quantum-Resistant HTTPS Initiative in Chrome
  • Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser
  • US-Israel Cyber Operations Intensify Amid Iran Tensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News