Russia’s APT28 (Fancy Bear) weaponized the Microsoft Office zero-day CVE-2026-21509 within one day of Microsoft’s public disclosure, targeting users in Ukraine, Slovakia, and Romania. Zscaler ThreatLabz is tracking the campaign as Operation Neusploit.

Campaign overview

AttributeDetails
Campaign nameOperation Neusploit
Threat actorAPT28 / Fancy Bear / UAC-0001
AttributionRussia’s GRU (Unit 26165)
VulnerabilityCVE-2026-21509
Time to weaponization<24 hours after disclosure
TargetsUkraine, Slovakia, Romania, Poland, Slovenia, Turkey, Greece, UAE
Malware deployedMiniDoor, NotDoor, PixyNetLoader, BEARDSHELL, Covenant Grunt
DiscoveryZscaler ThreatLabz, CERT-UA, Trellix

Timeline

DateEvent
January 26, 2026Microsoft releases out-of-band patch for CVE-2026-21509
January 27, 2026CISA adds CVE-2026-21509 to KEV catalog
January 27, 2026CERT-UA detects exploitation attempts (1 day after disclosure)
January 29, 2026Zscaler observes active exploitation in the wild
February 2026CERT-UA confirms 60+ targeted email addresses in Ukraine
February 3, 2026Zscaler publishes Operation Neusploit analysis
February 4, 2026Trellix publishes expanded analysis with new malware families

The one-day window between patch release and observed exploitation demonstrates APT28’s capability to rapidly weaponize disclosed vulnerabilities.

CVE-2026-21509

FieldValue
CVECVE-2026-21509
CVSS7.8 (High)
TypeSecurity Feature Bypass
Root causeReliance on untrusted inputs in security decision
ImpactOLE mitigation circumvention
CISA KEVAdded January 27, 2026
KEV DeadlineFebruary 16, 2026

The vulnerability allows attackers to bypass OLE (Object Linking and Embedding) mitigations in Microsoft Office. When a victim opens a specially crafted document, the protections that should block malicious embedded content are circumvented.

Technical mechanism

StepAction
1Victim receives malicious RTF document
2Document contains crafted OLE object
3Office security mitigations bypassed
4Embedded malicious content executes
5Dropper DLL downloaded from attacker server

Target profile

Initial targets (Zscaler/CERT-UA)

Target typeDetails
Ukrainian central executive authorities60+ email addresses confirmed by CERT-UA
EU policy organizationsCOREPER-themed lures
Slovak governmentLocalized documents
Romanian officialsGovernment correspondence themes

COREPER (Committee of Permanent Representatives) is the EU body that prepares European Council meetings—a high-value target for Russian intelligence.

Expanded targeting (Trellix - February 4)

Trellix researchers observed APT28 expanding operations within 24 hours of the vulnerability’s public disclosure:

CountrySector
PolandMilitary, government
SloveniaGovernment
TurkeyMaritime, transport
GreeceMaritime, transport
UAEMaritime, transport
UkraineGovernment, military

The targeting of maritime and transport organizations across multiple countries suggests intelligence collection related to supply chains, logistics, and potentially military movements.

Social engineering lures

Documents were localized for specific targets:

LanguageExample lureTarget audience
UkrainianMilitary-themed documentsDefense officials
RomanianGovernment correspondenceGovernment staff
SlovakEU-related contentPolicy officials
English”Consultation_Topics_Ukraine(Final).doc”EU policy staff

Attack chains

Zscaler identified two variants of the attack chain:

Variant 1: MiniDoor

PhaseAction
1Victim receives RTF file exploiting CVE-2026-21509
2Successful exploitation downloads dropper DLL
3Dropper installs MiniDoor
4MiniDoor monitors Outlook for email theft

Variant 2: PixyNetLoader

PhaseAction
1Same initial RTF exploit
2Dropper installs PixyNetLoader
3PixyNetLoader establishes persistence
4Deploys Covenant Grunt implant for C2

Malware analysis

MiniDoor

MiniDoor is a simplified version of NotDoor (aka GONEPOSTAL), previously attributed to APT28 by Lab52 researchers in September 2025.

AttributeDetails
TypeOutlook VBA-based email stealer
PersistenceMalicious Outlook VBA project
TriggerMonitors MAPILogonComplete event
Target foldersInbox, RssFeeds, Junk, Drafts

Capabilities:

FunctionAction
Email monitoringWatches for new messages
Email forwardingSends discovered emails to two hardcoded attacker addresses
Evidence deletionSets DeleteAfterSubmit to prevent Sent folder copies
StealthNo persistent network access required

The malware provides APT28 with access to victims’ email communications without requiring continuous C2 connectivity.

NotDoor (GONEPOSTAL) - Trellix analysis

Trellix’s February 4 report provided additional details on NotDoor, the full-featured Outlook VBA backdoor:

AttributeDetails
Also known asGONEPOSTAL
First documentedLab52, September 2025
TypeOutlook VBA backdoor
FunctionFull backdoor vs. MiniDoor’s stripped-down stealing

BEARDSHELL - New implant

Trellix documented a previously unreported custom implant:

AttributeDetails
NameBEARDSHELL
LanguageC++
TypeCustom implant
C2Filen.io cloud storage API
PurposePersistent access, command execution

The use of filen.io as C2 infrastructure allows malicious traffic to blend with normal cloud storage usage, complicating network-based detection.

PixyNetLoader

PixyNetLoader is a previously undocumented tool that establishes persistence and deploys additional components:

AttributeDetails
Decryption71-byte rolling XOR key for embedded payloads
Files droppedSplashScreen.png, EhStoreShell.dll, office.xml
PersistenceRegistry-based
C2Filen API (matches Operation Phantom Net Voxel tactics)

EhStoreShell.dll

TechniquePurpose
Export proxyingMimics legitimate DLL
Sleep() checksEvades sandbox analysis
Process validationDetects analysis environments
LSB steganographyExtracts shellcode from PNG pixels

Covenant Grunt

The final payload is a Covenant Grunt implant providing full command-and-control capabilities.

Evasion techniques

APT28 employed multiple evasion layers:

TechniquePurpose
Server-side geofencingOnly delivers payloads to targeted regions
User-Agent validationRejects requests without correct headers
MutexesPrevents multiple instances
Dynamic API hashing (DJB2)Evades static analysis
Time-based checksDetects sandbox environments
PNG steganographyHides shellcode in image files

The geofencing ensures that security researchers outside target regions receive benign responses when analyzing the infrastructure.

Multi-layered evasion (Trellix)

Trellix noted the sophistication of the overall attack chain:

“The entire chain is designed for resilience and evasion, utilizing encrypted payloads, legitimate cloud services for C2, in-memory execution, and process injection to minimize forensic artifacts.”

LayerTechnique
DeliveryEncrypted RTF documents
C2Legitimate cloud storage (filen.io)
ExecutionIn-memory payloads
PersistenceProcess injection
ForensicsMinimal disk artifacts

This multi-layered approach demonstrates APT28’s evolved tradecraft in maintaining persistent access while evading detection across enterprise environments.

Attribution

CERT-UA attributes the campaign to UAC-0001, their designation for APT28.

Attribution evidence

EvidenceDetails
TTP overlapMatches documented APT28 operations
Filen API C2Same technique used in Operation Phantom Net Voxel (Sekoia, September 2025)
MiniDoor codeSimilarities with NotDoor
Target selectionConsistent with Russian strategic interests
Rapid weaponizationCapability signature of APT28

APT28 background

AttributeDetails
Also known asFancy Bear, Forest Blizzard, Sofacy, UAC-0001
AffiliationRussia’s GRU Military Intelligence (Unit 26165)
Active sinceAt least 2004
Primary targetsNATO countries, Ukraine, defense sector

Detection

Zscaler signatures

DetectionDescription
RTF.Exploit.CVE-2026-21509Exploit document detection
Win32.Spyware.MiniDoorMiniDoor malware

Indicators to monitor

IndicatorMeaning
RTF documents with OLE objects from external sourcesPotential exploitation
Outlook macro activity on user systemsMiniDoor activity
Connections to Filen API from corporate networksPixyNetLoader C2
Email forwarding rules to unknown external addressesEmail theft
PNG files with unusual entropySteganography payload

Recommendations

Immediate actions

PriorityAction
CriticalApply Microsoft’s January 26 security update
CriticalBlock RTF files from external sources at email gateways
HighEnable Protected View for all Office documents
HighMonitor Outlook for suspicious macro activity
HighImplement network segmentation

Patch verification

Office versionFix method
Microsoft 365 / Office 2021+ / LTSCService-side change (restart Office apps)
Office 2016Update to 16.0.5539.1001+
Office 2019Update to 16.0.10417.20095+

For organizations in target regions

PriorityAction
CriticalConduct proactive threat hunting for Operation Neusploit IOCs
HighBrief staff on EU/military-themed phishing
HighMonitor for unexpected email forwarding rules
MediumReview Outlook VBA project configurations
OngoingCoordinate with national CERTs

Context

Operation Neusploit demonstrates APT28’s operational agility—weaponizing a disclosed vulnerability within 24 hours of Microsoft’s patch release. Organizations in Ukraine, Slovakia, and Romania should assume they may be targeted and conduct proactive threat hunting.

The campaign’s focus on email theft via MiniDoor reflects APT28’s intelligence collection priorities. Email access provides visibility into communications, relationships, and decision-making processes without requiring persistent network presence.

The combination of rapid vulnerability exploitation, sophisticated evasion techniques, and targeted social engineering makes Operation Neusploit a representative example of Russian state-sponsored cyber operations against NATO-adjacent countries.