Russia-linked APT28 attackers already abusing new Microsoft Office zero-day
(2026/02/02)
- Reference: 1770056302
- News link: https://www.theregister.co.uk/2026/02/02/russialinked_apt28_microsoft_office_bug/
- Source link:
Russia-linked attackers are already exploiting Microsoft's latest Office zero-day, with Ukraine's national cyber defense team warning that the same bug is being used to target government agencies inside the country and organizations across the EU.
In an [1]alert published on Sunday , CERT-UA says the activity is being driven by UAC-0001, better known as "APT28" or "Fancy Bear", and hinges on CVE-2026-21509, a security feature bypass bug in Microsoft Office that [2]Microsoft disclosed last week alongside a warning that attackers were already exploiting it in the wild.
According to CERT-UA, the first weaponized document surfaced just days after Microsoft sounded the alarm about the flaw. A file titled "Consultation_Topics_Ukraine(Final).doc" appeared publicly on January 29 and was themed around EU discussions on Ukraine. File metadata shows it was created on January 27 — the day after Microsoft published details of the flaw — a turnaround time that suggests the exploit chain was already prepared and waiting.
[3]
That same day, Ukrainian incident responders were alerted to a parallel phishing campaign impersonating official correspondence from the Ukrhydrometeorological Center. More than 60 recipients, mostly across central government bodies, received emails carrying a malicious DOC attachment. Opening the file in Office quietly initiates a WebDAV connection to an external server, downloads a shortcut file, and uses it as a launchpad for further malware.
[4]Microsoft's Sinofsky saw Surface fail coming – then hit up Epstein for advice on exit
[5]Microsoft's 'atypical' emergency Windows patches are becoming awfully typical
[6]Patch Tuesday meets Groundhog Day as Windows hibernation bug returns
[7]Surrender as a service: Microsoft unlocks BitLocker for feds
From there, the attackers drop a DLL masquerading as a legitimate Windows component and stash shellcode inside what appears to be a harmless image file. They then establish persistence via COM hijacking and a scheduled task that restarts explorer.exe, ensuring the malicious code is reloaded. Most users would notice little out of the ordinary, but the attackers now have a foothold they can return to.
The end result is the deployment of the COVENANT post-exploitation framework, and the attackers route their traffic through a legitimate cloud storage service, which helps it blend in as everyday noise rather than something obviously hostile. CERT-UA has advised defenders to monitor Filen-related traffic closely or block it outright where possible.
[8]
The campaign has not been confined to Ukraine. In the final days of January, CERT-UA identified three more malicious documents using the same exploit chain and targeting organizations in EU member states. In one case, the domain serving the payload was registered on the very day it was used, underlining how fast the attackers are cycling through infrastructure.
Microsoft now has patches out, including for older Office builds that initially sat in limbo, but CERT-UA is still not optimistic about how quickly they'll land.
[9]
"It is obvious that in the near future, including due to the inertia of the process or impossibility of users updating the Microsoft Office suite and/or using recommended protection mechanisms, the number of cyberattacks using the described vulnerability will begin to increase," CERT-UA warned. ®
Get our [10]Tech Resources
[1] https://cert.gov.ua/article/6287250
[2] https://www.theregister.com/2026/01/27/office_zeroday_exploited_in_the/
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[4] https://www.theregister.com/2026/02/02/microsoft_sinofsky_epstein/
[5] https://www.theregister.com/2026/02/02/microsoft_quality_control/
[6] https://www.theregister.com/2026/02/02/windows_hibernation_bug/
[7] https://www.theregister.com/2026/01/23/surrender_as_a_service_microsoft/
[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[10] https://whitepapers.theregister.com/
In an [1]alert published on Sunday , CERT-UA says the activity is being driven by UAC-0001, better known as "APT28" or "Fancy Bear", and hinges on CVE-2026-21509, a security feature bypass bug in Microsoft Office that [2]Microsoft disclosed last week alongside a warning that attackers were already exploiting it in the wild.
According to CERT-UA, the first weaponized document surfaced just days after Microsoft sounded the alarm about the flaw. A file titled "Consultation_Topics_Ukraine(Final).doc" appeared publicly on January 29 and was themed around EU discussions on Ukraine. File metadata shows it was created on January 27 — the day after Microsoft published details of the flaw — a turnaround time that suggests the exploit chain was already prepared and waiting.
[3]
That same day, Ukrainian incident responders were alerted to a parallel phishing campaign impersonating official correspondence from the Ukrhydrometeorological Center. More than 60 recipients, mostly across central government bodies, received emails carrying a malicious DOC attachment. Opening the file in Office quietly initiates a WebDAV connection to an external server, downloads a shortcut file, and uses it as a launchpad for further malware.
[4]Microsoft's Sinofsky saw Surface fail coming – then hit up Epstein for advice on exit
[5]Microsoft's 'atypical' emergency Windows patches are becoming awfully typical
[6]Patch Tuesday meets Groundhog Day as Windows hibernation bug returns
[7]Surrender as a service: Microsoft unlocks BitLocker for feds
From there, the attackers drop a DLL masquerading as a legitimate Windows component and stash shellcode inside what appears to be a harmless image file. They then establish persistence via COM hijacking and a scheduled task that restarts explorer.exe, ensuring the malicious code is reloaded. Most users would notice little out of the ordinary, but the attackers now have a foothold they can return to.
The end result is the deployment of the COVENANT post-exploitation framework, and the attackers route their traffic through a legitimate cloud storage service, which helps it blend in as everyday noise rather than something obviously hostile. CERT-UA has advised defenders to monitor Filen-related traffic closely or block it outright where possible.
[8]
The campaign has not been confined to Ukraine. In the final days of January, CERT-UA identified three more malicious documents using the same exploit chain and targeting organizations in EU member states. In one case, the domain serving the payload was registered on the very day it was used, underlining how fast the attackers are cycling through infrastructure.
Microsoft now has patches out, including for older Office builds that initially sat in limbo, but CERT-UA is still not optimistic about how quickly they'll land.
[9]
"It is obvious that in the near future, including due to the inertia of the process or impossibility of users updating the Microsoft Office suite and/or using recommended protection mechanisms, the number of cyberattacks using the described vulnerability will begin to increase," CERT-UA warned. ®
Get our [10]Tech Resources
[1] https://cert.gov.ua/article/6287250
[2] https://www.theregister.com/2026/01/27/office_zeroday_exploited_in_the/
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[4] https://www.theregister.com/2026/02/02/microsoft_sinofsky_epstein/
[5] https://www.theregister.com/2026/02/02/microsoft_quality_control/
[6] https://www.theregister.com/2026/02/02/windows_hibernation_bug/
[7] https://www.theregister.com/2026/01/23/surrender_as_a_service_microsoft/
[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYEskBGB8DOhkrG6Qf98AQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[10] https://whitepapers.theregister.com/
Carry-on regardless
To the russian attackers, please continue and don't stop until they discontinue this pile of crap