Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      $200 Million Deployed: Why Binance’s Bitcoin Conversions Haven’t Moved the Market

      February 4, 2026

      One Bitcoin Chart Correctly Predicts the 5% Bounce — But 3 Metrics Now Question It

      February 4, 2026

      Tether’s $500 Billion Fundraising Retreat Stokes Speculation—Is an IPO Ever Coming?

      February 4, 2026

      BitMine Faces Over $6 Billion in Unrealized Losses, but Tom Lee Says It’s Part of the Plan

      February 4, 2026

      Why Bitcoin’s Defense of $76,000 Matters for MicroStrategy’s Q4 Earnings Narrative

      February 4, 2026
    • Technology

      9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

      February 4, 2026

      I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

      February 4, 2026

      Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

      February 4, 2026

      We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

      February 4, 2026

      Today’s NYT Connections: Sports Edition Hints and Answers for Feb. 4, #499

      February 4, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Russian hackers exploit recently patched Microsoft Office bug in attacks
    Technology

    Russian hackers exploit recently patched Microsoft Office bug in attacks

    TechAiVerseBy TechAiVerseFebruary 3, 2026No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Russian hackers exploit recently patched Microsoft Office bug in attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Russian hackers exploit recently patched Microsoft Office bug in attacks

    Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.

    On January 26, Microsoft released an emergency out-of-band security update marking CVE-2026-21509 as an actively exploited zero-day flaw.

    CERT-UA detected the distribution of malicious DOC files exploiting the flaw, themed around EU COREPER consultations in Ukraine, just three days after Microsoft’s alert.

    In other cases, the emails impersonated the Ukrainian Hydrometeorological Center and were sent to over 60 government-related addresses.

    However, the agency says that the metadata associated with the document shows that it was created one day after the emergency update.

    The Ukrainian CERT attributed these attacks to APT28, a nation-state threat actor also known as Fancy Bear and Sofacy and associated with Russia’s General Staff Main Intelligence Directorate (GRU).

    Opening the malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).

    Malicious document triggering exploitation of CVE-2026-21509
    Source: CERT-UA

    “The scheduled task execution leads to termination and restart of the explorer.exe process, which, among other things, thanks to COM hijacking, ensures loading of the “EhStoreShell.dll” file,” CERT-UA says in the report.

    “This DLL executes shellcode from the image file, which in turn ensures the launch on the computer of the COVENANT software (framework).”

    This is the same malware loader CERT-UA linked to APT28 attacks in June 2025, which exploited Signal chats to deliver the BeardShell and SlimAgent malware to government organizations in Ukraine.

    The agency reports that COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. Monitoring for connections associated with the platform, or blocking them completely, should improve the defense against this threat.

    Subsequent investigations revealed that APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine. In one observed case, the domains supporting the attacks were registered on the same day.

    Organizations are recommended to apply the latest security update on Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps. For Office 2021 and later, ensure users restart applications to allow the updates to be applied.

    If immediate patching is impossible, it is recommended to implement the registry-based mitigation instructions in our original coverage of the flaw.

    Microsoft previously stated that Defender’s Protected View adds an extra layer of defense by blocking malicious Office files originating from the Internet unless explicitly trusted.


    The future of IT infrastructure is here

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMalicious MoltBot skills used to push password-stealing malware
    Next Article New GlassWorm attack targets macOS via compromised OpenVSX extensions
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 2026

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 2026

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025651 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025245 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025145 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 4, 2026

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling ProsIf you’re a Peloton…

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 20260 Views

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 20260 Views

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 20260 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.