Russian hackers exploit Microsoft Office vulnerability days after patch

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

On January 28, 2026, a 72-hour spear-phishing campaign began, delivering at least 29 distinct email lures to organizations across nine countries, including Poland, Slovenia, Turkey, Greece, the UAE, Ukraine, Romania, and Bolivia. The targets primarily included defense ministries (40 percent), transportation and logistics operators (35 percent), and diplomatic entities (25 percent). The attackers exploited CVE-2026-21509, a critical Microsoft Office vulnerability patched in an urgent, unscheduled update late the previous month. Less than 48 hours after the patch, the hackers reverse-engineered it to create an advanced exploit that installed one of two novel backdoors: BeardShell or NotDoor.

The campaign was engineered for stealth and speed. Initial infections came from previously compromised government email accounts, likely familiar to recipients. Exploits and payloads were encrypted and executed in memory, evading endpoint detection. Command-and-control channels used legitimate cloud services, often allow-listed in sensitive networks.

BeardShell provided full system reconnaissance, persistence by injecting into Windows svchost.exe processes, and enabled lateral movement, leaving no disk-based artifacts beyond memory traces from code injection. NotDoor, deployed as a VBA macro after disabling Outlook's security controls, monitored folders like Inbox, Drafts, Junk Mail, and RSS Feeds. It bundled emails into .msg files sent to attacker-controlled accounts on filen.io, then deleted them using a custom 'AlreadyForwarded' property and 'DeleteAfterSubmit' flag to avoid detection in high-privilege accounts.

"The use of CVE-2026-21509 demonstrates how quickly state-aligned actors can weaponize new vulnerabilities, shrinking the window for defenders to patch critical systems," Trellix researchers wrote. The firm attributed the operation to APT28—also tracked as Fancy Bear, Sednit, Forest Blizzard, and Sofacy—with high confidence, citing technical indicators, targets, and tradecraft like multi-stage malware and cloud service abuse. Ukraine's CERT-UA linked it to UAC-0001, corresponding to APT28, known for cyber espionage and influence operations.

Trellix provided indicators of compromise for organizations to check for infections.

Labaran da ke da alaƙa

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Hoton da AI ya samar

Russian hackers use Linux VMs to hide malware on Windows

An Ruwaito ta hanyar AI Hoton da AI ya samar

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

An Ruwaito ta hanyar AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

An Ruwaito ta hanyar AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

An Ruwaito ta hanyar AI

Microsoft has rolled out a second out-of-band update for Windows 11 to resolve crashes in Outlook and issues with cloud-stored files. The patch targets bugs introduced by the company's January 2026 security update. This follows a previous emergency fix last week addressing shutdown and login problems.

 

 

 

Wannan shafin yana amfani da cookies

Muna amfani da cookies don nazari don inganta shafin mu. Karanta manufar sirri mu don ƙarin bayani.
Ƙi