Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch

APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch

Posted on March 2, 2026 By CWS

A critical zero-day vulnerability within Microsoft’s HTML framework, dubbed CVE-2026-21513, has been targeted by the cyber threat group APT28. This flaw enables attackers to bypass security protocols and execute arbitrary code with a high CVSS score of 8.8, posing a significant risk across all Windows versions.

Discovery and Analysis by Akamai

Akamai’s security team identified the exploitation of this vulnerability by APT28, a group linked to the Russian state, prior to Microsoft delivering a patch in February 2026. Utilizing PatchDiff-AI, a multi-agent artificial intelligence system, researchers pinpointed the root cause of the vulnerability.

The vulnerability stems from the ieframe.dll component, specifically within the function _AttemptShellExecuteForHlinkNavigate, which manages hyperlink navigation. Insufficient URL validation permits malicious input to reach code paths that invoke the ShellExecuteExW function, allowing unauthorized execution of both local and remote resources.

APT28’s Exploit Tactics

APT28 leveraged a malicious sample identified on VirusTotal, submitted on January 30, 2026. This sample, named document.doc.LnK.download, was linked to the group’s infrastructure. The exploit uses a crafted Windows Shortcut (.lnk) file with an embedded HTML file following the LNK structure.

Upon execution, the LNK file connects to a domain associated with APT28’s multi-stage attacks, wellnesscaremed[.]com. This technique manipulates trust boundaries using nested iframes and multiple Document Object Model (DOM) contexts, effectively bypassing security measures like the Mark of the Web and Internet Explorer Enhanced Security Configuration.

Mitigation and Security Measures

Microsoft addressed this vulnerability in their February 2026 Patch Tuesday update, implementing stricter validation for hyperlink protocols. This update ensures proper execution within the browser context, preventing direct calls to ShellExecuteExW.

Akamai has provided Indicators of Compromise (IOCs) to aid network defenders. These include specific file names, domain indicators, and MITRE techniques like T1204.001 and T1566.001. Organizations are urged to apply the latest security updates and remain vigilant against potential alternative delivery methods.

While APT28’s observed campaign utilized malicious .LNK files, any component embedding MSHTML could potentially trigger this vulnerability. Continuous vigilance and timely application of security patches remain crucial for protecting against such threats.

Cyber Security News Tags:Akamai, APT28, CVE-2026-21513, cyber attack, Cybersecurity, Exploit, malicious files, Microsoft, MSHTML, security patch, security update, threat intelligence, Vulnerability, zero-day

Post navigation

Previous Post: Google’s Quantum-Resistant HTTPS Initiative in Chrome
Next Post: Global Outage Disrupts Claude AI Services

Related Posts

Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Cyber Security News
Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens Cyber Security News
MediaTek Chip Flaw Exposes Android PINs in Seconds MediaTek Chip Flaw Exposes Android PINs in Seconds Cyber Security News
Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Cyber Security News
CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks
  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks
  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark