Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Home/CyberSecurity News/Hackers Exploit Microsoft Office 0-day Exploiting Vulnerability
CyberSecurity News

Hackers Exploit Microsoft Office 0-day Exploiting Vulnerability

A critical zero-day vulnerability in Microsoft Office is currently under active exploitation by the Russia-linked threat group UAC-0001, also known as APT28. The group is using this flaw to deploy...

Sarah simpson
Sarah simpson
February 2, 2026 2 Min Read
4 0

A critical zero-day vulnerability in Microsoft Office is currently under active exploitation by the Russia-linked threat group UAC-0001, also known as APT28.

The group is using this flaw to deploy sophisticated malware against Ukrainian government entities and European Union organizations.

The vulnerability, identified as CVE-2026-21509, was disclosed by Microsoft on January 26, 2026, with warnings about active exploitation in the wild.

Within 24 hours of Microsoft’s public disclosure, threat actors had already weaponized the vulnerability.

Rapid Exploitation After Disclosure

On January 27, 2026, security researchers discovered a malicious DOC file titled “Consultation_Topics_Ukraine(Final).doc” containing an exploit for CVE-2026-21509.

chain of damage ( source :CERT-UA )
chain of damage ( source : CERT-UA )

The document was themed around consultations of the Committee of Permanent Representatives to the EU (COREPER) regarding Ukraine, demonstrating the attackers’ use of geopolitically relevant social engineering tactics.

On January 29, 2026, the Ukrainian Computer Emergency Response Team (CERT-UA) detected a widespread phishing campaign distributing malicious documents purporting to be weather bulletins from the Ukrhydrometeorological Center.

The campaign targeted over 60 email addresses, primarily belonging to Ukrainian central executive bodies.

Attack Chain and Technical Details

When victims open the weaponized document in Microsoft Office, the exploit establishes a network connection to the attacker’s infrastructure via the WebDAV protocol.

the content of documents with the exploit ( source :CERT-UA )
The content of documents with the exploit ( source :CERT-UA )

The malware downloads a shortcut file containing executable code that deploys multiple malicious components, including “EhStoreShell.dll” and “SplashScreen.png”, containing shellcode.

The attack leverages COM hijacking techniques by modifying Windows registry entries and creates a scheduled task named “OneDriveHealth” for persistence.

The final payload is COVENANT, a sophisticated post-exploitation framework that uses legitimate Filen cloud storage (filen.io) for command-and-control communications.

This approach helps evade detection by blending malicious traffic with legitimate cloud service activity. Additional malicious documents targeting EU countries were discovered in late January 2026.

In one case, attackers registered attack infrastructure domain names on the same day as the attack, indicating rapid operational capabilities.

CERT-UA security experts warn that exploitation attempts are likely to increase due to slow patching cycles and users’ inability to update Microsoft Office installations promptly.

Organizations should immediately implement Microsoft’s recommended registry-based mitigations, monitor network connections to FileCloud storage infrastructure, and block identified indicators of compromise.

Users should exercise extreme caution when opening unsolicited Office documents, particularly those with geopolitical or administrative themes.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CVEExploitHackerMalwarePatchphishingSecurityThreatVulnerabilityzero-day

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

NationStates Game Site Offline After Major Databreach

Next Post

Punishing Owl Hacker Group Targets Russian Security Agency

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
JDownloader Hacked to Infect Users with New Python RAT
May 11, 2026
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us