Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Minneapolis tech community remains strong during ‘tense and difficult times’

Intel will start manufacturing GPUs, a market dominated by Nvidia

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 uses Microsoft Office CVE-2026-21509 in espionage-focused malware attack
Identity

APT28 uses Microsoft Office CVE-2026-21509 in espionage-focused malware attack

userBy userFebruary 3, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 3, 2026Vulnerabilities/Malware

microsoft office

A Russian-linked state-sponsored threat actor known as APT28 (also known as UAC-0001) is believed to have exploited a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit.

Zscaler ThreatLabz said it observed a group of hackers exploiting the flaw in attacks targeting users in Ukraine, Slovakia, and Romania on January 29, 2026, three days after Microsoft disclosed the existence of the bug.

The vulnerability in question, CVE-2026-21509 (CVSS score: 7.8), bypasses security features in Microsoft Office that could be triggered by an unauthorized attacker by sending a specially crafted Office file.

“Social engineering lures were created in both English and localized languages ​​(Romanian, Slovak, Ukrainian) to target users in the respective countries,” said security researchers Sudeep Singh and Roy Tay. “The attackers employed server-side evasion techniques and responded with a malicious DLL only if the request originated from the targeted geographic region and contained the correct User-Agent HTTP header.”

cyber security

In a nutshell, this attack chain uses a malicious RTF file to exploit a security hole and distribute two different versions of the dropper. One is designed to drop an Outlook email stealer called MiniDoor, and the other is called PixyNetLoader and is responsible for deploying the Covenant Grunt implant.

The first dropper acts as a conduit to deliver the MiniDoor. MiniDoor is a C++-based DLL file that steals users’ emails in various folders (Inbox, Junk, Drafts) and forwards them to two hard-coded threat actor email addresses.[.]com and ahmeclaw@proton[.]myself. MiniDoor is considered to be a simplified version of NotDoor (also known as GONEPOSTAL), which was documented by S2 Grupo LAB52 in September 2025.

In contrast, the second dropper, namely PixyNetLoader, is used to initiate a more complex attack chain that involves delivering additional embedded components and setting up persistence on the host using COM object hijacking. The extracted payload includes a shellcode loader (‘EhStoreShell.dll’) and a PNG image (‘SplashScreen.png’).

The main role of the loader is to parse and execute shellcode hidden using steganography within the image. However, the loader only activates its malicious logic if the infected machine is not an analysis environment and the host process that launched the DLL is ‘explorer.exe’. If the conditions are not met, the malware remains dormant.

The extracted shellcode is ultimately used to load the embedded .NET assembly. It is nothing but a Grunt implant associated with the open source .NET COVENANT command and control (C2) framework. It is worth noting that the use of Grunt Stager by APT28 was highlighted by Sekoia in September 2025 in connection with a campaign called Operation Phantom Net Voxel.

cyber security

“PixyNetLoader’s infection chain shares significant overlap with Operation Phantom Net Voxel,” Zscaler said. “Previous campaigns used VBA macros, but this activity replaces them with DLLs while retaining similar techniques, including (1) COM hijacking for execution, (2) DLL proxies, (3) XOR string encryption techniques, and (4) Covenant Grunt and its shellcode loader embedded in PNG via steganography.”

This disclosure coincides with a report from the Computer Emergency Response Team of Ukraine (CERT-UA), which also warned that APT28 was exploiting CVE-2026-21509 by using Word documents to target more than 60 email addresses associated with the country’s central administrative authorities. Metadata analysis revealed that one of the lure documents was created on January 27, 2026.

“During the investigation, it was discovered that when a document is opened using Microsoft Office, a network connection is established to an external resource using the WebDAV protocol and a file with a shortcut file name containing program code designed to download and run an executable file is downloaded,” CERT-UA said.

This triggers the same attack chain as PixyNetLoader and introduces the Grunt implant of the COVENANT framework.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStudy identifies key contributors to PFAS exposure among U.S. firefighters
Next Article Physicists push thousands of atoms into ‘Schrodinger’s cat’ state – bringing quantum world closer to reality than ever before
user
  • Website

Related Posts

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 4, 2026

Docker fixes critical Ask Gordon AI flaw that allows code execution via image metadata

February 3, 2026

Learn what to build, buy, and automate

February 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Minneapolis tech community remains strong during ‘tense and difficult times’

Intel will start manufacturing GPUs, a market dominated by Nvidia

Plans for 2026: What’s next for Startup Battlefield 200?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.