Signal

APT28 exploits newly disclosed microsoft office CVE-2026-21509

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-02-03 09:12 UTCUpdated 2026-02-03 21:52 UTC
rss
cveexploitationaptmicrosoft_officeespionageukraine
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (4 domains)domains are deduped. counts indicate coverage, not truth.
4 top sources shown
Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU
The Record (Recorded Future News) · News · therecord.media · 2026-02-03 16:27 UTC
Overview

Reporting converges on a fast-moving exploitation cycle: shortly after Microsoft disclosed and patched a new Office vulnerability, Russia-linked APT28 was observed weaponizing it in espionage-focused activity. Coverage highlights targeting in Ukraine and parts of Europe, with researchers describing malicious document-based lures used to initiate a multi-stage infection chain.

Entities
MicrosoftZscalerCERT-UA
Score total
1.54
Momentum 24h
4
Posts
4
Origins
4
Source types
1
Duplicate ratio
0%
Why now
  • CERT-UA and researchers report exploitation shortly after Microsoft disclosure
  • Multiple outlets corroborate active use of CVE-2026-21509
  • Fresh reporting emphasizes quick operationalization by APT28
Why it matters
  • Rapid weaponization after disclosure compresses patching and detection timelines
  • Document-based lures can reach many users via routine workflows
  • Espionage-focused targeting raises risk for government and regional orgs
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • APT28 exploited Microsoft Office vulnerability CVE-2026-21509 shortly after disclosure/patching.
  • Observed activity includes targeting in Ukraine and parts of Europe.
  • Attacks used crafted document content (including RTF) to start a multi-stage infection chain delivering malicious payloads.
How sources frame it
  • The Hacker News: neutral
  • SecurityWeek: neutral
  • Dark Reading: neutral
  • The Record (Recorded Future News): neutral
Multiple outlets report rapid exploitation of a newly disclosed Microsoft Office flaw by Russia-linked APT28, with targeting focused on Ukraine and parts of Europe.
All evidence
All evidence
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
Dark Reading · darkreading.com · 2026-02-03 21:52 UTC
Russian state hackers exploit new Microsoft Office flaw in attacks on Ukraine, EU
The Record (Recorded Future News) · therecord.media · 2026-02-03 16:27 UTC
Russia’s APT28 Rapidly Weaponizes Newly Patched Office Vulnerability
SecurityWeek · securityweek.com · 2026-02-03 11:22 UTC
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
The Hacker News · thehackernews.com · 2026-02-03 09:12 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 4Origin domains: 4Duplicates: -
Showing 4 / 0
Top publishers (this list)
  • Dark Reading (1)
  • The Record (Recorded Future News) (1)
  • SecurityWeek (1)
  • The Hacker News (1)
Top origin domains (this list)
  • darkreading.com (1)
  • therecord.media (1)
  • securityweek.com (1)
  • thehackernews.com (1)