#APT28 hackers deploy customized variant of #Covenant #OpenSource tool
#APT28 hackers deploy customized variant of #Covenant #OpenSource tool
APT28 Leverages CVE-2026-21509 in Operation Neusploit
Zscaler’s ThreatLabz examines the technical details of Operation Neusploit, a Russia-linked advanced persistent threat group (APT28) that leveraged specially crafted RTF files to exploit CVE-2026-21509.
Pulse ID: 69a6d099bd131eb626296631
Pulse Link: https://otx.alienvault.com/pulse/69a6d099bd131eb626296631
Pulse Author: CyberHunter_NL
Created: 2026-03-03 12:14:17
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#APT28 #CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #RTF #Russia #ThreatLabz #Zscaler #bot #CyberHunter_NL
Organizations Targeted by APT28 Group via Webhook-Based Macro Malware
Pulse ID: 699f3c59b1d0c02a08fd005c
Pulse Link: https://otx.alienvault.com/pulse/699f3c59b1d0c02a08fd005c
Pulse Author: cryptocti
Created: 2026-02-25 18:15:53
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#APT28 #CyberSecurity #InfoSec #Mac #Malware #OTX #OpenThreatExchange #bot #cryptocti
Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513
This analysis examines CVE-2026-21513, a security bypass vulnerability in Microsoft's MSHTML framework, patched in February 2026. The flaw, actively exploited by Russian state-sponsored actor APT28, affects all Windows versions and has a CVSS score of 8.8. Using PatchDiff-AI, researchers identified the root cause in ieframe.dll's hyperlink navigation handling, allowing arbitrary file execution outside the browser's security context. The exploit involves a crafted Windows Shortcut file embedding HTML, communicating with APT28-linked infrastructure. It bypasses security measures like Mark of the Web and IE Enhanced Security Configuration through nested iframes and DOM manipulation, ultimately invoking ShellExecuteExW for out-of-sandbox execution.
Pulse ID: 699ee10d4bfa4e5fcf71399d
Pulse Link: https://otx.alienvault.com/pulse/699ee10d4bfa4e5fcf71399d
Pulse Author: AlienVault
Created: 2026-02-25 11:46:21
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#APT28 #Browser #CyberSecurity #HTML #InfoSec #Microsoft #OTX #OpenThreatExchange #RAT #Russia #Vulnerability #Windows #bot #AlienVault
APT28 “Operation MacroMaze”:
Macro malware + webhook.site exfiltration
Legit SaaS abused as C2
Europe targeted (Sept 2025–Jan 2026)