Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

APT28 is related to CVE-2026-21513 MSHTML 0-Day exploited before February 2026 Patch Tuesday

NASA strengthens Artemis mission

Polymer breakthrough could redefine PFAS removal from water

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 is related to CVE-2026-21513 MSHTML 0-Day exploited before February 2026 Patch Tuesday
Identity

APT28 is related to CVE-2026-21513 MSHTML 0-Day exploited before February 2026 Patch Tuesday

userBy userMarch 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 2, 2026Vulnerability/Threat Intelligence

New findings from Akamai reveal that a recently disclosed security flaw patched by Microsoft may have been exploited by a Russian-linked state-sponsored threat actor known as APT28.

The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML framework.

“A failure in the MSHTML framework’s protection mechanisms could allow an unauthorized attacker to bypass security features via the network,” Microsoft wrote in its advisory for the flaw. This issue was fixed by the Windows manufacturer as part of the February 2026 Patch Tuesday update.

However, the tech giant also noted that this vulnerability was exploited as a zero-day exploit in real-life attacks, and acknowledged that Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group (GTIG) reported this vulnerability.

In a hypothetical attack scenario, an attacker could exploit the vulnerability by persuading a victim to open a malicious HTML or shortcut (LNK) file delivered as a link or email attachment.

Microsoft notes that when a specially crafted file is opened, it manipulates browser and Windows shell processing and causes its contents to be executed by the operating system. This could allow an attacker to bypass security features and potentially result in code execution.

Although the company has not publicly released details about its zero-day exploit efforts, Akamai said it has identified malicious artifacts related to APT28-linked infrastructure that were uploaded to VirusTotal on January 30, 2026.

It is worth noting that this sample was reported by the Computer Emergency Response Team of Ukraine (CERT-UA) early last month in connection with the APT28 attack that exploited another security flaw in Microsoft Office (CVE-2026-21509, CVSS score: 7.8).

The web infrastructure company said CVE-2026-21513 is rooted in logic within ieframe.dll that handles hyperlink navigation and is the result of insufficient validation of the target URL, allowing attacker-controlled input to reach the code path that calls ShellExecuteExW. This allows local or remote resources to run outside the intended browser security context.

“The payload contains a specially crafted Windows shortcut (LNK) that embeds an HTML file immediately after the standard LNK structure,” said security researcher Maor Dahan. ‘LNK file initiates communication with domain Wellnesscaremed[.]com is attributed to APT28 and is used extensively in multi-stage payloads in campaigns. This exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries. ”

Akamai noted that this technique allows attackers to bypass Mark-of-the-Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC), leading to security context downgrades and ultimately facilitating the execution of malicious code outside of the browser sandbox via ShellExecuteExW.

“Although the observed campaign leverages a malicious LNK file, the vulnerable code path can be triggered through any component that embeds MSHTML,” the company added. “Therefore, additional delivery mechanisms beyond LNK-based phishing should be expected.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNASA strengthens Artemis mission
user
  • Website

Related Posts

North Korean hackers publish 26 npm packages that hide cross-platform RAT Pastebin C2

March 2, 2026

ClawJacked flaw allows malicious sites to hijack local OpenClaw AI agents via WebSockets

February 28, 2026

Gemini Access exposes thousands of public Google Cloud API keys after API activation

February 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

APT28 is related to CVE-2026-21513 MSHTML 0-Day exploited before February 2026 Patch Tuesday

NASA strengthens Artemis mission

Polymer breakthrough could redefine PFAS removal from water

North Korean hackers publish 26 npm packages that hide cross-platform RAT Pastebin C2

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.