Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
    Cybersecurity

    Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)

    adminBy adminFebruary 3, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Russian state-sponsored hackers Fancy Bear (aka APT 28) are exploiting CVE-2026-21509, a Microsoft Office vulnerability for which Microsoft released an emergency fix last week.

    The exploitation

    CVE-2026-21509 allows unauthorized attackers to bypass a security feature (OLE mitigations in Microsoft 365 and Microsoft Office) locally, by creating and tricking targets into opening booby-trapped Office files.

    On January 29, 2026 – three days after Microsoft released the aforementioned fix – Zscaler researchers flagged an email phishing campaign delivering backdoors via weaponized RTF files.

    “We observed two variants of the attack chain. Both variants begin with a specially crafted RTF file that weaponizes CVE-2026-21509 and, after successful exploitation, downloads a malicious dropper DLL from the threat actor’s server,” they shared.

    “The first dropper variant DLL is responsible for deploying a malicious Microsoft Outlook Visual Basic for Applications (VBA) project named MiniDoor. MiniDoor’s primary goal is to steal the user’s emails and forward them to the threat actor.”

    The second dropper variant triggeres a multi-stage infection chain that starts with the (previously undocumented) PixyNetLoader.

    PixyNetLoader drops malicious components on the target endpoint and prepares the Windows environment for the download and execution of additional payloads, including a Grunt implant associated with the open source Covenant C2 framework.

    The targets

    According to Zscaler, the targets of these campaigns were users in Central and Eastern Europe, including Ukraine, Slovakia, and Romania, and the emails were written in the Romanian, Ukrainian, and English language.

    The Ukrainian CERT says that one of the booby-trapped files – Consultation_Topics_Ukraine(Final).doc – was created on January 27, just a day after Microsoft’s out-of-band fix was released. The file contains text related to the consultations of the Committee of Permanent Representatives to the EU (COREPER) on the situation in Ukraine.

    Another file – BULLETEN_H.doc – was sent to via email to 60+ email addresses, predominantly belonging to the central executive authorities of Ukraine, the CERT noted. The email was purportedly sent by the Ukrainian Hydrometeorological Center.

    In the last days of January 2026, three more documents with a similar exploit were discovered. Ukraine’s CERT says that they expect the number of attacks using this particular vulnerability to increase, as attackers are betting on targets being slow (or unable) to patch or mitigate the flaw.

    Attack attribution

    The targets, the MiniDoor backdoor, the abuse of the Filen (cloud storage) API for C2 communication by the Covenant Grunt samples, and the techniques used in the attacks all point to the involvement of the Russia-linked threat actor APT28, according to Zscaler researchers.

    It’s unknown whether the group exploited CVE-2026-21509 before Microsoft devised a fix, but it seems likely, as they’ve been know to leverage other zero-day vulnerabilities throughout the years.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    CVE202621509 exploiting hackers Microsoft Office patched Russian vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Updates Googlebot File Size Limit Docs
    Next Article This Is What You’ll Find the Best Deals on During This Year’s Presidents Day Sales
    admin
    • Website

    Related Posts

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Pixel Weather app update brings new redesigned icons

    March 5, 2026

    Data center new builds diminish even as demand rises

    March 5, 2026

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (623)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (760)
    • WiFi / Internet & Networking (112)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Pixel Weather app update brings new redesigned icons

    March 5, 2026

    Data center new builds diminish even as demand rises

    March 5, 2026
    Most Popular
    • Russian Ransomware Operator Pleads Guilty in US
    • Pixel Weather app update brings new redesigned icons
    • Data center new builds diminish even as demand rises
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.