APT28 Exploits Microsoft Office Zero-Day in Operation Neusploit Targeting Europe

APT28 Exploits Microsoft Office Zero-Day in Targeted Cyber Attacks Across Europe

In a recent surge of cyber espionage, the Russian-linked threat group APT28, also known as Fancy Bear, has been actively exploiting a critical zero-day vulnerability in Microsoft Office, identified as CVE-2026-21509. This campaign, dubbed Operation Neusploit, has primarily targeted governmental and institutional entities across Central and Eastern Europe, including Ukraine, Slovakia, and Romania.

Discovery and Exploitation Timeline

The vulnerability, CVE-2026-21509, is a security feature bypass in Microsoft Office that allows attackers to execute arbitrary code via specially crafted Office files. Microsoft publicly disclosed this flaw on January 26, 2026, and released an emergency patch to address it. However, within just three days, on January 29, 2026, security researchers from Zscaler ThreatLabz observed APT28 actively exploiting this vulnerability in the wild. ([cybersecuritynews.com](https://cybersecuritynews.com/apt28-hackers-exploiting-microsoft-office-0-day/?utm_source=openai))

Attack Methodology

The attack initiates with socially engineered emails containing malicious Rich Text Format (RTF) documents. These emails are meticulously crafted in English and local languages—Romanian, Slovak, and Ukrainian—to enhance their credibility and increase the likelihood of the recipient opening the attachment. Upon opening the RTF file, the embedded exploit triggers the vulnerability, allowing the attackers to execute arbitrary code on the victim’s system without any visible warning.

Infection Chain and Payloads

The infection chain employed by APT28 involves multiple stages and two distinct variants of dropper malware:

1. MiniDoor Deployment:
– Functionality: MiniDoor is a lightweight email-stealing tool developed using Microsoft Outlook’s Visual Basic for Applications (VBA).
– Operation: Once deployed, MiniDoor monitors Outlook login events and systematically harvests emails from folders such as Inbox, Junk, and Drafts. The stolen emails are then forwarded to hardcoded email addresses controlled by the attackers.
– Persistence Mechanism: To maintain its foothold, the dropper modifies Windows registry settings to disable Outlook’s security protections and ensures the malicious macro loads automatically each time Outlook is launched.

2. PixyNetLoader Deployment:
– Functionality: PixyNetLoader serves as a loader for deploying the Covenant Grunt implant, providing the attackers with robust command-and-control capabilities over the compromised system.
– Operation: This variant employs advanced evasion techniques, including server-side checks that deliver the malicious payload only to requests originating from targeted geographic regions with specific HTTP headers. This selective delivery mechanism complicates detection and analysis efforts by security researchers.

Technical Details of the Exploit

The exploitation process involves several sophisticated steps:

– Initial Exploit Delivery: The malicious RTF document exploits CVE-2026-21509, leading to the execution of a dropper malware.
– Payload Deployment: Depending on the dropper variant, either MiniDoor or PixyNetLoader is deployed.
– Command-and-Control Establishment: In the case of PixyNetLoader, the Covenant Grunt implant is installed, establishing a command-and-control channel that allows attackers to execute commands, exfiltrate data, and maintain persistent access to the compromised system.

Attribution to APT28

The attribution of this campaign to APT28 is based on several factors:

– Geographical Targeting: The focus on Ukraine, Slovakia, and Romania aligns with APT28’s historical targeting patterns.
– Tool Overlaps: The use of MiniDoor, a tool with similarities to NotDoor—previously associated with APT28—suggests a continuation of the group’s toolset.
– Tactics, Techniques, and Procedures (TTPs): The employment of server-side evasion techniques, COM hijacking for persistence, and the use of the Covenant C2 framework are consistent with APT28’s known methodologies.

Mitigation and Recommendations

Given the active exploitation of CVE-2026-21509, it is imperative for organizations to take immediate action:

1. Apply Security Patches: Ensure that all Microsoft Office installations are updated with the latest security patches released by Microsoft on January 26, 2026.
2. User Awareness Training: Educate employees about the risks of opening unsolicited emails and attachments, even if they appear to be from legitimate sources.
3. Monitor Network Traffic: Implement monitoring solutions to detect unusual network activity, such as unexpected WebDAV connections or communications with known command-and-control servers.
4. Restrict Macro Execution: Configure Office applications to disable macros by default and only enable them for trusted documents.
5. Geographical Access Controls: Implement access controls that restrict the execution of certain files or scripts based on geographic origin, as APT28 has demonstrated region-specific targeting.

Conclusion

The rapid exploitation of CVE-2026-21509 by APT28 underscores the persistent threat posed by state-sponsored actors and the importance of timely patching and robust cybersecurity practices. Organizations, especially those in targeted regions, must remain vigilant and proactive in their defense strategies to mitigate the risks associated with such sophisticated cyber attacks.