By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Russian hackers exploit recently patched Microsoft Office bug in attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Russian hackers exploit recently patched Microsoft Office bug in attacks
Tech News

Russian hackers exploit recently patched Microsoft Office bug in attacks

By admin 3 Min Read
Share
SHARE

Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.

On January 26, Microsoft released an emergency out-of-band security update marking CVE-2026-21509 as an actively exploited zero-day flaw.

CERT-UA detected the distribution of malicious DOC files exploiting the flaw, themed around EU COREPER consultations in Ukraine, just three days after Microsoft’s alert.

Wiz

In other cases, the emails impersonated the Ukrainian Hydrometeorological Center and were sent to over 60 government-related addresses.

However, the agency says that the metadata associated with the document shows that it was created one day after the emergency update.

The Ukrainian CERT attributed these attacks to APT28, a nation-state threat actor also known as Fancy Bear and Sofacy and associated with Russia’s General Staff Main Intelligence Directorate (GRU).

Opening the malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).

Malicious document triggering exploitation of CVE-2026-21509
<strong>Malicious document triggering exploitation of CVE-2026-21509</strong><br /><em>Source: CERT-UA</em>

“The scheduled task execution leads to termination and restart of the explorer.exe process, which, among other things, thanks to COM hijacking, ensures loading of the “EhStoreShell.dll” file,” CERT-UA says in the report.

“This DLL executes shellcode from the image file, which in turn ensures the launch on the computer of the COVENANT software (framework).”

This is the same malware loader CERT-UA linked to APT28 attacks in June 2025, which exploited Signal chats to deliver the BeardShell and SlimAgent malware to government organizations in Ukraine.

The agency reports that COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. Monitoring for connections associated with the platform, or blocking them completely, should improve the defense against this threat.

Subsequent investigations revealed that APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine. In one observed case, the domains supporting the attacks were registered on the same day.

Organizations are recommended to apply the latest security update on Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps. For Office 2021 and later, ensure users restart applications to allow the updates to be applied.

If immediate patching is impossible, it is recommended to implement the registry-based mitigation instructions in our original coverage of the flaw.

Microsoft previously stated that Defender’s Protected View adds an extra layer of defense by blocking malicious Office files originating from the Internet unless explicitly trusted.

tines

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

You Might Also Like

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here

China’s DeepSeek suffers rare outage lasting several hours

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

TAGGED: Actively Exploited, APT28, Microsoft office, Security Bypass, Ukraine, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Where Is Savannah Guthrie’s Mom Nancy Now? Updates on Her Mother’s Missing Persons Case
Next Article Steam Lawsuit in the UK, Valve Faces $900M Antitrust Claim
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here
Tech News
2026 World Cup: 9 Non-USA Group Stage Matches We're Excited For
Sports
Stock Market Holiday: NSE, BSE shut tomorrow for Mahavir Jayanti; check 12 upcoming holidays
Business
TxFlow L1 mainnet launch marks a new phase for multi-application on-chain finance
Crypto
China’s DeepSeek suffers rare outage lasting several hours
Tech News
Gold and silver prices plunge: Why has safe-haven demand faded amid Iran war?
Business
Qatar and Ukraine sign defence agreement as Zelenskyy’s Gulf tour shapes new partnerships
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?