Particle.news
Download on the App Store

APT28 Exploits Newly Patched Microsoft Office Flaw in Targeted Campaigns

The exploit chain was weaponized within days of Microsoft's emergency fix, prompting urgent patching guidance.

Overview

  • CERT-UA and Zscaler report weaponized documents seen on January 29, with metadata showing a lure created on January 27, one day after Microsoft released the patch for CVE-2026-21509.
  • Observed attacks install either the MiniDoor Outlook email stealer or a PixyNetLoader chain that uses COM hijacking, a malicious EhStoreShell.dll, steganographic code in SplashScreen.png, and a scheduled task to run a Covenant Grunt implant.
  • Targets include Ukrainian government addresses and organizations in Slovakia and Romania, with phishing lures localized by language and themed on EU consultations related to Ukraine.
  • Delivery relies on WebDAV downloads and server-side filtering that checks geography and User-Agent strings, with command-and-control traffic routed through the Filen cloud storage service to blend in.
  • Microsoft issued out-of-band updates for supported Office versions and advises using Protected View and available registry-based mitigations, while CERT-UA and Zscaler have published indicators of compromise for defenders.