Russian hackers exploit Microsoft Office vulnerability days after patch

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

On January 28, 2026, a 72-hour spear-phishing campaign began, delivering at least 29 distinct email lures to organizations across nine countries, including Poland, Slovenia, Turkey, Greece, the UAE, Ukraine, Romania, and Bolivia. The targets primarily included defense ministries (40 percent), transportation and logistics operators (35 percent), and diplomatic entities (25 percent). The attackers exploited CVE-2026-21509, a critical Microsoft Office vulnerability patched in an urgent, unscheduled update late the previous month. Less than 48 hours after the patch, the hackers reverse-engineered it to create an advanced exploit that installed one of two novel backdoors: BeardShell or NotDoor.

The campaign was engineered for stealth and speed. Initial infections came from previously compromised government email accounts, likely familiar to recipients. Exploits and payloads were encrypted and executed in memory, evading endpoint detection. Command-and-control channels used legitimate cloud services, often allow-listed in sensitive networks.

BeardShell provided full system reconnaissance, persistence by injecting into Windows svchost.exe processes, and enabled lateral movement, leaving no disk-based artifacts beyond memory traces from code injection. NotDoor, deployed as a VBA macro after disabling Outlook's security controls, monitored folders like Inbox, Drafts, Junk Mail, and RSS Feeds. It bundled emails into .msg files sent to attacker-controlled accounts on filen.io, then deleted them using a custom 'AlreadyForwarded' property and 'DeleteAfterSubmit' flag to avoid detection in high-privilege accounts.

"The use of CVE-2026-21509 demonstrates how quickly state-aligned actors can weaponize new vulnerabilities, shrinking the window for defenders to patch critical systems," Trellix researchers wrote. The firm attributed the operation to APT28—also tracked as Fancy Bear, Sednit, Forest Blizzard, and Sofacy—with high confidence, citing technical indicators, targets, and tradecraft like multi-stage malware and cloud service abuse. Ukraine's CERT-UA linked it to UAC-0001, corresponding to APT28, known for cyber espionage and influence operations.

Trellix provided indicators of compromise for organizations to check for infections.

Makala yanayohusiana

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Picha iliyoundwa na AI

Russian hackers use Linux VMs to hide malware on Windows

Imeripotiwa na AI Picha iliyoundwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Imeripotiwa na AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Imeripotiwa na AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Imeripotiwa na AI

Microsoft has rolled out a second out-of-band update for Windows 11 to resolve crashes in Outlook and issues with cloud-stored files. The patch targets bugs introduced by the company's January 2026 security update. This follows a previous emergency fix last week addressing shutdown and login problems.

Jumanne, 27. Mwezi wa kwanza 2026, 23:02:25

Microsoft patches security flaw in Office software

Ijumaa, 23. Mwezi wa kwanza 2026, 05:13:14

Fortinet FortiGate devices face automated attacks creating rogue accounts

Jumatano, 21. Mwezi wa kwanza 2026, 17:17:18

Attackers hijack Linux Snap Store apps to steal crypto phrases

Jumanne, 13. Mwezi wa kwanza 2026, 14:43:27

US government urged to patch critical Gogs security flaw

Alhamisi, 8. Mwezi wa kwanza 2026, 07:18:04

China-linked UAT-7290 targets telecoms with Linux malware

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumanne, 16. Mwezi wa kumi na mbili 2025, 06:25:47

Serious cyberattack targets France's interior ministry

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 23:54:19

China-nexus groups and cybercriminals ramp up React2Shell exploits

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 08:50:00

Russian cybercriminals release new ransomware

Jumatano, 10. Mwezi wa kumi na mbili 2025, 07:11:22

North Korean hackers exploit maximum severity React2Shell flaw

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa