Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/Threats/APT28 Exploits Microsoft Office Vulnerability in Government
Threats

APT28 Exploits Microsoft Office Vulnerability in Government

APT28, the Russian state-sponsored threat group, has launched a sophisticated cyber espionage campaign. This operation targets high-value government and military entities across Europe. The primary...

Sarah simpson
Sarah simpson
February 5, 2026 3 Min Read
5 0

APT28, the Russian state-sponsored threat group, has launched a sophisticated cyber espionage campaign. This operation targets high-value government and military entities across Europe.

The primary targets include maritime and transport organizations in nations such as Poland, Ukraine, and Turkey. The attackers are actively exploiting a critical vulnerability in Microsoft Office, tracked as CVE-2026-21509.

This security flaw allows threat actors to bypass established protections and execute malicious code on compromised systems with alarming ease.

The assault commences with highly targeted spear-phishing emails crafted to mimic urgent official correspondence.

These deceptive messages employ geopolitical lures, such as alerts regarding weapons smuggling or invitations to military training programs, to trick recipients.

When a victim opens the weaponized document, the exploit triggers automatically without requiring any interaction, such as enabling macros.

This “zero-click” capability renders the attack particularly potent against defense ministries and diplomatic institutions.

Trellix analysts identified this malicious activity and highlighted the adversary’s speed, noting they weaponized the flaw within twenty-four hours of its public disclosure.

The attack documents utilize specially crafted embedded objects that leverage the WebDAV protocol to retrieve external payloads from attacker-controlled infrastructure.

This method effectively circumvents standard network defenses by disguising malicious traffic as legitimate web requests, allowing the intruders to establish a foothold undetected.

Multi-stage infection chain employed by APT28 (Source - Trellix)
Multi-stage infection chain employed by APT28 (Source – Trellix)

Upon successful exploitation, the hackers deploy a diverse arsenal of custom malware to secure their position.

The primary payloads include a C++ implant dubbed “BeardShell” and a specialized Outlook backdoor named “NotDoor.”

Phishing email and decoys (Source - Trellix)
Phishing email and decoys (Source – Trellix)

These sophisticated tools enable the attackers to maintain persistent access, steal sensitive intelligence, and move laterally across the victim’s network.

The campaign’s reliance on legitimate cloud services for command and control further complicates detection efforts.

Deep Dive: Evasion and Persistence Mechanisms

The infection chain is meticulously engineered for resilience and stealth, employing multiple layers of obfuscation to bypass security controls.

Following the initial breach, a loader retrieves an encrypted image file containing hidden shellcode. This payload executes the BeardShell backdoor directly in the system’s memory, avoiding disk-based artifacts that traditional antivirus solutions might flag.

The malware also includes anti-analysis routines, such as timing checks, to determine if it is running in a security sandbox.

Furthermore, the attackers abuse the legitimate cloud storage service filen.io to manage their command and control communications.

By encrypting traffic and routing it through this trusted platform, they effectively blend malicious directives with normal user data.

To mitigate these threats, organizations are strongly advised to apply emergency Office patches immediately and restrict the WebDAV protocol. Implementing strict email filtering rules can also help block the initial delivery vectors.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

BreachCVEExploitHackerMalwarePatchphishingSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Beware of Weaponized Voicemail Messages that Allows Hackers to

Next Post

DragonForce Ransomware Attacks Critical Business Data Exfiltration

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us