Russia-linked APT28 group actively exploits Microsoft Office vulnerability CVE-2026-21509 to deliver sophisticated malware implants targeting Ukrainian, Slovakian, and Romanian entities.

Security researchers have confirmed active exploitation of a critical Microsoft Office vulnerability by the Russia-linked APT28 threat group (also tracked as UAC-0001). Designated CVE-2026-21509 (CVSS 7.8), this security feature bypass flaw enables attackers to execute malicious code via specially crafted Office documents. The campaign, dubbed Operation Neusploit by Zscaler ThreatLabz, specifically targets government and organizational entities in Ukraine, Slovakia, and Romania.
Attack Chain Mechanics
APT28's attack chain begins with weaponized RTF files distributed through geographically tailored phishing lures:
- Geofencing Evasion: Malicious payloads only deploy when victims originate from targeted regions (Ukraine, Slovakia, Romania) with specific browser signatures
- Dual Payload Strategy:
- MiniDoor: Lightweight DLL stealer harvesting Outlook emails (Inbox/Junk/Drafts) sent to actor-controlled addresses (
ahmeclaw2002@outlook[.]comandahmeclaw@proton[.]me) - PixyNetLoader: Advanced dropper deploying Covenant Grunt implants via multi-stage execution:
- Uses COM hijacking for persistence
- Embeds shellcode within PNG files via steganography (
SplashScreen.png) - Executes only when host process is
explorer.exe(evading analysis environments)
- MiniDoor: Lightweight DLL stealer harvesting Outlook emails (Inbox/Junk/Drafts) sent to actor-controlled addresses (
Technical Connections to Historical Campaigns
This operation shares significant overlap with APT28's September 2025 Operation Phantom Net Voxel, documented by Sekoia. While replacing VBA macros with DLL-based execution, attackers maintained four core techniques:
- COM hijacking persistence
- DLL proxying
- XOR-based string encryption
- Covenant Grunt deployment via steganographic payloads
The Covenant C2 framework, an open-source offensive tool, provides attackers with flexible command-and-control capabilities. The Ukrainian CERT confirms identical attacks against 60+ government email addresses using weaponized Word documents pulling payloads via WebDAV protocols.
Defense Recommendations
Organizations should implement these protective measures immediately:
- Patch Enforcement: Apply Microsoft's emergency update for CVE-2026-21509 across all Office installations
- Email Filtering: Block RTF attachments and WebDAV protocol requests at network perimeter
- Behavior Monitoring: Detect suspicious Office child processes spawning
explorer.exeor accessing PNG files - User Training: Educate staff on identifying localized phishing lures (Slovak/Ukrainian/Romanian themes)
- Threat Hunting: Search for execution artifacts like
EhStoreShell.dllor registry COM hijacks
Zscaler researchers Sudeep Singh and Roy Tay emphasize: "The combination of geographic targeting, multi-layered evasion, and Covenant's adaptable framework makes this campaign particularly dangerous for high-value targets." Continuous monitoring for suspicious Office document behavior remains critical as APT28 refines their tactics.


Comments
Please log in or register to join the discussion