Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Exploits Microsoft Office Flaw in Malware Attacks

APT28 Exploits Microsoft Office Flaw in Malware Attacks

Posted on February 3, 2026 By CWS

Key Points

  • APT28, a Russia-linked group, is leveraging a Microsoft Office vulnerability in targeted attacks.
  • The flaw, identified as CVE-2026-21509, is being used to deploy malware in Ukraine, Slovakia, and Romania.
  • Attack methodologies include social engineering and advanced evasion techniques.

Introduction to APT28’s Latest Campaign

The cyber threat group known as APT28 has been identified in a series of sophisticated cyberattacks exploiting a newly discovered vulnerability in Microsoft Office. This vulnerability, known as CVE-2026-21509, has a CVSS score of 7.8, indicating its high severity. The attacks, part of an operation named Neusploit, began on January 29, 2026, shortly after Microsoft released details about the flaw.

Targeting users in Ukraine, Slovakia, and Romania, APT28 utilized social engineering tactics to launch their attack. The strategy involved crafting deceptive documents in multiple languages, including English, Romanian, Slovak, and Ukrainian, aiming to exploit the loophole in Microsoft Office software.

Technical Breakdown of the Attack

The attack leverages a malicious RTF file to exploit the Microsoft Office vulnerability. This file serves as a conduit for two distinct malware droppers: MiniDoor and PixyNetLoader. MiniDoor, a C++-based DLL, is designed to exfiltrate emails from various folders to predetermined email addresses. This tool is believed to be a simplified version of an earlier malware known as NotDoor.

PixyNetLoader, on the other hand, initiates a more complex attack sequence. It employs COM object hijacking to establish persistence on the infected system, embedding additional components such as a shellcode loader and a cleverly disguised PNG image.

  • The shellcode loader’s primary function is to extract and execute embedded code hidden within the PNG image through steganography.
  • This covert action only proceeds if the malware detects it is not under analysis and is executed by the ‘explorer.exe’ process.

APT28’s Strategic Use of Covenant Framework

APT28’s attack chain culminates in deploying a Grunt implant from the open-source .NET COVENANT command-and-control framework. This approach mirrors aspects of a previous campaign, Operation Phantom Net Voxel, which Sekoia documented in 2025. Notably, the current attack replaces VBA macros with DLLs but retains techniques such as COM hijacking and string encryption.

In parallel, a report from the Computer Emergency Response Team of Ukraine (CERT-UA) has highlighted APT28’s exploitation of this vulnerability using Word documents. This campaign targeted over 60 email addresses linked to Ukrainian governmental authorities. Analysis shows that one of the documents was created on January 27, 2026, underscoring the organized nature of the operation.

Conclusion

APT28’s ongoing exploitation of the Microsoft Office vulnerability, CVE-2026-21509, underscores the persistent threat posed by state-sponsored cyber actors. Their sophisticated tactics and ability to adapt to new technical landscapes make them a formidable opponent in the realm of cybersecurity. Continued vigilance and timely updates to software are crucial in mitigating such threats.

Frequently Asked Questions

  • What is APT28?
    APT28, also known as UAC-0001, is a state-sponsored threat actor linked to Russia, known for its advanced cyber-espionage campaigns.
  • What is CVE-2026-21509?
    CVE-2026-21509 is a security feature bypass vulnerability in Microsoft Office with a high severity score of 7.8.
  • How does APT28 exploit this vulnerability?
    APT28 uses crafted RTF files to exploit the flaw, leading to the deployment of malware droppers like MiniDoor and PixyNetLoader.
  • Who are the primary targets of these attacks?
    The primary targets are users in Ukraine, Slovakia, and Romania, with a focus on governmental and strategic institutions.
  • What can organizations do to protect themselves?
    Organizations should ensure Microsoft Office is updated with the latest security patches and monitor for unusual network activity.
The Hacker News Tags:APT28, CERT-UA, Covenant Grunt, CVE-2026-21509, Cybersecurity, Malware, Microsoft Office, Operation Neusploit, Romania, Slovakia, social engineering, threat actor, Ukraine, Zscaler

Post navigation

Previous Post: Critical Hikvision Vulnerability Threatens Wireless Access Points
Next Post: Critical Apache Syncope Vulnerability Exposes User Sessions

Related Posts

Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms The Hacker News
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware The Hacker News
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News
Chrome Security Flaw Allowed Extension Exploits Chrome Security Flaw Allowed Extension Exploits The Hacker News
China-Linked Group Uses BPFDoor to Spy on Telecoms China-Linked Group Uses BPFDoor to Spy on Telecoms The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark