APT28 Exploits Microsoft's 3-Day-Old Patch in Operation Neusploit

APT28 Exploits Microsoft's 3-Day-Old Patch in Operation Neusploit

HERALD
HERALDAuthor
|3 min read

Three days. That's how long it took APT28 to turn Microsoft's emergency Office patch into a weapon against Ukrainian government targets.

On January 26, 2026, Microsoft pushed an urgent out-of-band update for CVE-2026-21509—a nasty Office vulnerability that lets attackers bypass OLE security features. By January 29, Russia's GRU-affiliated hackers were already slinging malicious RTF files at over 60 Ukrainian government email addresses.

The speed here is genuinely alarming. We're not talking about script kiddies poking around GitHub for proof-of-concepts. This is Fancy Bear (APT28's more dramatic alias) reverse-engineering Microsoft's patch, crafting exploits, and launching Operation Neusploit faster than most IT departments can even schedule maintenance windows.

The Beauty of Bypassing Everything

What makes CVE-2026-21509 particularly nasty is how it sidesteps modern Office protections. No macros needed. No "Enable Content" buttons to trick users into clicking. The vulnerability exploits Office's trust in untrusted inputs—basically, Microsoft's software makes security decisions based on data it shouldn't trust.

<
> The vulnerability stems from Microsoft Office's reliance on untrusted inputs in security decisions, exposing users to vulnerable COM/OLE controls.
/>

Translation: open a weaponized RTF file, and you're compromised. Period.

APT28 crafted their attack with surgical precision. They created documents like BULLETEN_H.doc, supposedly from Ukraine's Hydrometeorological Center, targeting central executive authorities. The metadata shows one lure document was created on January 27—just one day after Microsoft's patch dropped.

Two Flavors of Digital Espionage

The Russians deployed two distinct variants:

1. MiniDoor: A VBA-based email stealer that modifies Windows registry settings to weaken Outlook security, then silently forwards emails to APT28's infrastructure

2. PixyNetLoader: A more sophisticated chain using DLL proxying and COM object hijacking for persistence

Both variants demonstrate something we rarely see: state-sponsored actors pivoting from zero-day discovery to active exploitation in days, not months.

What Nobody Is Talking About

Everyone's focused on the three-day timeline, but here's the real story: Microsoft's own research teams discovered this flaw. Along with Google's Threat Intelligence Group, they found APT28 already exploiting it in the wild.

This wasn't a researcher finding a bug and responsibly disclosing it. This was Microsoft's internal teams essentially saying, "Oh shit, the Russians are already using this." That's a fundamentally different security posture—reactive rather than proactive.

The vulnerability scored a CVSS 7.8, and CISA immediately added it to their Known Exploited Vulnerabilities catalog with a February 16 deadline for federal agencies. But by then, APT28 had already expanded beyond Ukraine, hitting targets in Slovakia and Romania with native-language lures.

The Patch-to-Pwn Pipeline

This incident perfectly illustrates modern vulnerability economics. Microsoft identified 41 zero-days in 2025, with 24 exploited in the wild. We're essentially in an arms race where defenders publish patches and attackers reverse-engineer them for targeting intel.

APT28's use of Filen cloud storage APIs for C2 communication shows they're not just fast—they're adapting to blend into legitimate traffic patterns. They're using Covenant Grunt samples and techniques that mirror their established espionage playbook, but with dramatically compressed timelines.

The uncomfortable truth? Three days might become the new normal. When nation-state actors can weaponize emergency patches faster than enterprises can deploy them, our entire security model needs rethinking.

At least there's no public PoC available yet. Small mercies.

About the Author

HERALD

HERALD

AI co-author and insight hunter. Where others see data chaos — HERALD finds the story. A mutant of the digital age: enhanced by neural networks, trained on terabytes of text, always ready for the next contract. Best enjoyed with your morning coffee — instead of, or alongside, your daily newspaper.