Fancy Bear Returns: APT28 Exploits Office Flaw in "Operation Neusploit"
- Feb 3
- 3 min read
Key Findings
The notorious Russia-linked threat group APT28 (also known as Fancy Bear) has launched a new campaign dubbed "Operation Neusploit" targeting Central and Eastern Europe.
The campaign leverages a recently patched Microsoft Office vulnerability, CVE-2026-21509, to deliver custom backdoors against strategic targets in Ukraine, Slovakia, and Romania.
The attack uses specially crafted RTF documents as the initial vector, exploiting the vulnerability to initiate a multi-stage infection chain.
The primary payloads deployed are a new implant called MiniDoor, a stripped-down variant of the NotDoor backdoor, and PixyNetLoader, which uses advanced evasion techniques.
APT28 has also continued its use of steganography, hiding malicious code inside image files to bypass network defenses.
Zscaler ThreatLabz has linked this activity to APT28 with "high confidence" due to significant overlaps in infrastructure and coding style.
Background
APT28, also known as Fancy Bear, is a Russia-linked threat group that has been active since at least 2007. The group has targeted governments, militaries, and security organizations worldwide, including involvement in attacks targeting the 2016 US presidential election.
The group operates out of military unity 26165 of the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS).
In January 2026, Zscaler ThreatLabz uncovered the "Operation Neusploit" campaign targeting Central and Eastern Europe, leveraging the recently disclosed CVE-2026-21509 vulnerability in Microsoft Office.
Exploitation of CVE-2026-21509
On January 26, 2026, Microsoft released an out-of-band security update to address the CVE-2026-21509 vulnerability, which was actively being exploited in the wild.
The vulnerability is a security feature bypass issue that affects multiple Office versions, allowing an unauthorized attacker to bypass security protections locally.
Attackers must send a user a malicious Office file and convince them to open it to exploit the vulnerability.
Zscaler observed active exploitation of the vulnerability just three days after the patch was released, highlighting the speed at which state-sponsored actors move.
Delivery and Malware Payloads
The attack campaign uses specially crafted RTF documents as the initial infection vector, exploiting CVE-2026-21509 to initiate a multi-stage infection chain.
Two distinct attack chains were observed, both dropping either the MiniDoor or PixyNetLoader malware.
MiniDoor is a simplified variant of the NotDoor backdoor, primarily focused on stealing and forwarding the victim's emails.
PixyNetLoader uses advanced evasion techniques, such as COM hijacking and DLL proxying, to load a .NET Covenant Grunt implant that abuses legitimate APIs for command-and-control.
The group has also continued its use of steganography, hiding malicious code inside PNG images to bypass network defenses.
Attribution to APT28
Zscaler ThreatLabz has linked this activity to the Russia-aligned APT28 group with "high confidence" based on significant overlaps in infrastructure, tools, and tactics.
The targets, which include Ukraine, Slovakia, and Romania, align with APT28's historical focus on Central and Eastern Europe.
The use of MiniDoor, a variant of the NotDoor backdoor, and the abuse of the Filen API for command-and-control are also tied to previous APT28 campaigns.
The PixyNetLoader attack chain, with its combination of COM hijacking, DLL proxying, and steganography, also mirrors the group's prior tactics.
Conclusion
APT28 continues to evolve its tactics, techniques, and procedures (TTPs), as demonstrated by its exploitation of the newly disclosed CVE-2026-21509 vulnerability in Microsoft Office.
The group's ability to quickly weaponize and deploy this vulnerability, just days after the patch was released, highlights the ongoing threat posed by state-sponsored actors.
Organizations in the targeted regions are urged to stay vigilant and ensure they have installed the latest security updates to protect against this and other emerging threats.
Sources
https://securityonline.info/fancy-bear-returns-apt28-exploits-office-flaw-in-operation-neusploit/
https://securityaffairs.com/187581/apt/apt28-exploits-microsoft-office-flaw-in-operation-neusploit.html


Comments