Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Feb 4, 2026

Russian state-linked hackers from the APT28 group — also known as Fancy Bear, Sofacy, and Strontium — are actively exploiting a recently patched Microsoft Office vulnerability (CVE-2026-21509) in targeted phishing attacks against government and public sector organizations across Eastern and Central Europe.

The Office flaw was patched by Microsoft on January 26, 2026, after being marked as an actively exploited zero-day. However, within just days of the update’s release, threat actors began distributing weaponized documents designed to exploit the vulnerability and deliver multiple malware components.

What’s Happening

Ukraine’s Computer Emergency Response Team (CERT-UA) first identified malicious Office documents exploiting the recently patched flaw on January 29, 2026 — only three days after the emergency update. These booby-trapped files were themed around European Union consultations and other government-related subjects to increase likelihood of opening.

Once a user opens one of these malicious documents, the exploit triggers a WebDAV-based download chain that abuses COM hijacking to load a malicious DLL (EhStoreShell.dll), execute shellcode embedded in an image (SplashScreen.png), and ultimately deploy a Covenant framework implant on the compromised machine.

CERT-UA and security researchers attribute the campaign to the Russia-linked APT28 group — notorious for sophisticated espionage and targeting government, defense, and critical infrastructure.

Technical Summary

Detail

Information

Vulnerability

CVE-2026-21509

Severity

Actively Exploited Zero-Day

Affected Products

Microsoft Office 2016, 2019, LTSC 2021/2024, Microsoft 365 Apps

Threat Actor

APT28 (Fancy Bear / Sofacy / Strontium)

Attack Vector

Malicious Office DOC/RTF attachments

Exploit Technique

WebDAV download chain, COM hijacking

Malware Delivered

DLL loader (EhStoreShell.dll), Covenant C2 framework

Geographic Targets

Ukraine, Slovakia, Romania, EU entities

Recommended Mitigations

Apply latest Office patch / restart apps, follow registry-based mitigations when patching isn’t immediate

How the Attack Works

The attackers use social engineering lures embedded in emails to entice targets to open malicious Office files. These files exploit the patched vulnerability by circumventing security mitigations and initiating a remote download sequence.

Once opened, the malicious document establishes a WebDAV connection that pulls down a payload. Through COM hijacking and scheduled task manipulation, the exploit loads a malicious DLL, which in turn triggers embedded shellcode and installs the Covenant command-and-control framework — a flexible platform often used for remote access and data exfiltration.

Evidence suggests multiple documents with similar exploit chains have been used against various EU-based organizations, indicating a broader campaign beyond Ukraine alone.

Recommendations for Organizations

Security teams should:

  • Apply Microsoft’s emergency patch for CVE-2026-21509 immediately across all affected Office products. For Office 2021 and later, ensure users restart applications so that updates take effect.

  • Implement registry-based mitigations as outlined by original advisories when patching isn’t feasible right away.

  • Enable Defender’s Protected View to block malicious files from untrusted sources by default.

  • Harden email defenses to flag and quarantine suspicious attachments tied to geopolitical or sector-specific lures.

Bottom Line

This incident highlights the speed at which advanced threat actors can weaponize publicly disclosed vulnerabilities — even soon after patches are released. Organizations that delay patch deployment or don’t enforce application restarts remain at high risk of compromise.

Summary: Microsoft Teams’ new Report a Call feature gives users a way to flag suspicious calls as potential scams or phishing attempts, empowering organizations to spot and respond to emerging threats. Rolling out from mid-March 2026, this addition enhances voice-based threat visibility and strengthens overall Teams security posture.

Latest News

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Feb 4, 2026

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Jan 30, 2026

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

Jan 29, 2026

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Jan 27, 2026

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Jan 22, 2026

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.