Security researchers uncover APT28 campaign exploiting newly disclosed Microsoft Office flaw

Cybersecurity investigators have identified a new cyberattack campaign connected to the Russia-linked hacking group APT28, also known as UAC-0001. The campaign, named Operation Neusploit, uses a recently discovered Microsoft Office vulnerability called CVE-2026-21509. Security researchers from Zscaler ThreatLabz revealed that the attackers began exploiting the weakness just days after Microsoft publicly disclosed it. The attacks have mainly targeted users in Ukraine, Slovakia, and Romania.

According to Zscaler ThreatLabz researchers Sudeep Singh and Roy Tay, the attackers created social engineering messages in multiple languages, including English, Romanian, Slovak, and Ukrainian. These messages were designed to trick people into opening malicious Microsoft Word files. The attackers also used advanced server-side evasion methods. These techniques allowed them to deliver harmful files only when requests came from selected geographic locations and contained specific web browser identification data. This method helped the attackers avoid detection while focusing only on intended targets.

How CVE-2026-21509 Is Used to Launch Malware Attacks

The vulnerability CVE-2026-21509 is a security feature bypass flaw in Microsoft Office. It allows hackers to send specially crafted Office files that can run malicious code when opened. In Operation Neusploit, attackers mainly used RTF files to begin the infection process.

Cyberattacks disrupt Danish services as pro-Russian hackers pressure government over Ukraine

Once a victim opens the infected file, it releases malware droppers. These droppers act like delivery systems that install additional harmful programs on the infected computer. One dropper installs a program called MiniDoor. MiniDoor is a C++-based dynamic link library designed to steal emails stored in different mailbox folders, including Inbox, Junk, and Drafts.

The stolen emails are secretly sent to attacker-controlled email accounts such as ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me. Security researchers believe MiniDoor is a smaller and simplified version of another malware called NotDoor, also known as GONEPOSTAL. The NotDoor malware was previously documented by S2 Grupo LAB52 in September 2025.

The second dropper used in the campaign is known as PixyNetLoader. This malware launches a much more complex attack chain. PixyNetLoader installs multiple hidden components into the system and creates persistence using a method called COM object hijacking. This technique allows the malware to run automatically using trusted system processes.

Advanced Stealth Techniques Used by PixyNetLoader and Covenant Framework

PixyNetLoader extracts several hidden files, including a shellcode loader named EhStoreShell.dll and an image file called SplashScreen.png. The image appears harmless but secretly stores malicious code using steganography, a technique that hides data inside images. The malicious files are often delivered through infected Microsoft Word documents designed to appear safe to users.

Global Microsoft 365 Outage Paralyzes Offices, Schools, and Remote Workforces Across Multiple Regions

The loader reads the hidden code from SplashScreen.png and executes it. However, the malware only activates if certain conditions are met. It checks whether the system is running inside a security testing environment. It also verifies if the malware was launched through explorer.exe. If these conditions are not satisfied, the malware remains inactive, helping it avoid detection by security researchers. In several observed attacks, the activation process begins after victims open specially crafted Microsoft Word files.

Once activated, the hidden shellcode loads a .NET assembly known as a Grunt implant. This implant is connected to the open-source .NET COVENANT command-and-control framework. The Covenant framework allows attackers to remotely control infected computers, steal data, and deploy additional malware. Many infections linked to this campaign have been traced back to weaponized Microsoft Word attachments sent through targeted phishing emails.

Security researchers noted that APT28 previously used the Covenant Grunt tool in a campaign called Operation Phantom Net Voxel. The earlier campaign was documented by Sekoia in September 2025. Zscaler ThreatLabz reported that Operation Neusploit shares multiple technical similarities with Operation Phantom Net Voxel. While the older campaign relied on VBA macros, the newer attacks replaced macros with DLL-based delivery. Both campaigns used similar tactics, including DLL proxying, XOR string encryption, COM hijacking, and steganography-based shellcode delivery.

Government Targeting and CERT-UA Findings

The Computer Emergency Response Team of Ukraine, known as CERT-UA, also reported separate findings connected to CVE-2026-21509 exploitation. CERT-UA discovered that APT28 used malicious Microsoft Word documents to target more than sixty email accounts linked to central executive authorities in Ukraine.

Metadata analysis showed that one of the lure documents used in the attacks was created on January 27, 2026. When opened, the infected document automatically created a network connection to an external server using the WebDAV protocol. This connection downloaded a shortcut file that secretly contained program code.

DOJ announces takedown of RapperBot botnet responsible for over 370,000
cyberattacks

The downloaded file then triggered additional malware installation steps that closely matched the PixyNetLoader infection chain. This process eventually led to the deployment of the Covenant framework’s Grunt implant inside the targeted systems.

CERT-UA confirmed that the attack used carefully structured multi-stage malware delivery. The campaign used trusted network communication methods and disguised files to avoid raising suspicion. The attack pattern revealed a highly organized espionage-focused operation using modern malware techniques and software vulnerability exploitation linked to Operation Neusploit.

Samruddhi Kulkarni
Samruddhi Kulkarni
Samruddhi Kulkarni is a cybersecurity and artificial intelligence specialist who reports on emerging cyber threats, advanced AI systems, and data-driven risk trends shaping the digital world.

TOP 10 TRENDING ON NEWSINTERPRETATION

Who stands to gain from plan of Bernie Sanders to tax billionaire wealth

A major policy proposal led by Bernie Sanders is...

OpenAI proposes worker-focused policies as AI reshapes the economy

Artificial intelligence is no longer just about smarter machines....

Surprise alliance as Tom Malinowski backs rival after AIPAC-backed loss

A closely watched primary election has taken an unexpected...

What Elon Musk does differently to save more and spend wisely

In a world where spending is often seen as...

Pune International Centre hosts discussion on Iran conflict highlighting India strategic role

A thought-provoking discussion in Pune brought attention to the...

From 126k to 70k: Why the Bitcoin crash cost Donald Trump 1.6 billion in personal wealth

A major financial move into cryptocurrency has drawn widespread...

Digital Armageddon? Claude Mythos strips away 30 years of internet security in three days

A major artificial intelligence company, Anthropic, has introduced a...

Russian disinformation group Storm 1516 targets Tisza Party with fake Jeffrey Epstein documents

A fresh wave of disinformation has surfaced during the...

Who stands to gain from plan of Bernie Sanders to tax billionaire wealth

A major policy proposal led by Bernie Sanders is...

OpenAI proposes worker-focused policies as AI reshapes the economy

Artificial intelligence is no longer just about smarter machines....

Surprise alliance as Tom Malinowski backs rival after AIPAC-backed loss

A closely watched primary election has taken an unexpected...

What Elon Musk does differently to save more and spend wisely

In a world where spending is often seen as...

Pune International Centre hosts discussion on Iran conflict highlighting India strategic role

A thought-provoking discussion in Pune brought attention to the...

From 126k to 70k: Why the Bitcoin crash cost Donald Trump 1.6 billion in personal wealth

A major financial move into cryptocurrency has drawn widespread...

Digital Armageddon? Claude Mythos strips away 30 years of internet security in three days

A major artificial intelligence company, Anthropic, has introduced a...

Related Articles

Popular Categories