Russian hackers exploit Microsoft Office vulnerability days after patch

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

On January 28, 2026, a 72-hour spear-phishing campaign began, delivering at least 29 distinct email lures to organizations across nine countries, including Poland, Slovenia, Turkey, Greece, the UAE, Ukraine, Romania, and Bolivia. The targets primarily included defense ministries (40 percent), transportation and logistics operators (35 percent), and diplomatic entities (25 percent). The attackers exploited CVE-2026-21509, a critical Microsoft Office vulnerability patched in an urgent, unscheduled update late the previous month. Less than 48 hours after the patch, the hackers reverse-engineered it to create an advanced exploit that installed one of two novel backdoors: BeardShell or NotDoor.

The campaign was engineered for stealth and speed. Initial infections came from previously compromised government email accounts, likely familiar to recipients. Exploits and payloads were encrypted and executed in memory, evading endpoint detection. Command-and-control channels used legitimate cloud services, often allow-listed in sensitive networks.

BeardShell provided full system reconnaissance, persistence by injecting into Windows svchost.exe processes, and enabled lateral movement, leaving no disk-based artifacts beyond memory traces from code injection. NotDoor, deployed as a VBA macro after disabling Outlook's security controls, monitored folders like Inbox, Drafts, Junk Mail, and RSS Feeds. It bundled emails into .msg files sent to attacker-controlled accounts on filen.io, then deleted them using a custom 'AlreadyForwarded' property and 'DeleteAfterSubmit' flag to avoid detection in high-privilege accounts.

"The use of CVE-2026-21509 demonstrates how quickly state-aligned actors can weaponize new vulnerabilities, shrinking the window for defenders to patch critical systems," Trellix researchers wrote. The firm attributed the operation to APT28—also tracked as Fancy Bear, Sednit, Forest Blizzard, and Sofacy—with high confidence, citing technical indicators, targets, and tradecraft like multi-stage malware and cloud service abuse. Ukraine's CERT-UA linked it to UAC-0001, corresponding to APT28, known for cyber espionage and influence operations.

Trellix provided indicators of compromise for organizations to check for infections.

Labaran da ke da alaƙa

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Hoton da AI ya samar

Russian hackers use Linux VMs to hide malware on Windows

An Ruwaito ta hanyar AI Hoton da AI ya samar

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

An Ruwaito ta hanyar AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

An Ruwaito ta hanyar AI

A critical remote code execution vulnerability has been discovered in multiple BeyondTrust products. The flaw, rated 9.9 out of 10 in severity, allows hackers to run code on affected systems without needing to log in. The issue was reported on February 10, 2026.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

An Ruwaito ta hanyar AI

A new Google research report indicates that the cloud security threat landscape is rapidly evolving. Hackers are increasingly targeting third parties and software vulnerabilities to breach systems. The report also notes a decline in cloud misconfigurations.

 

 

 

Wannan shafin yana amfani da cookies

Muna amfani da cookies don nazari don inganta shafin mu. Karanta manufar sirri mu don ƙarin bayani.
Ƙi