< Back to Insights
Threat Briefing 23 Feb 2026

Operation Neusploit β€” APT28 Weaponizes CVE-2026-21509 in 24 Hours

Russia's GRU-affiliated APT28 launched a 72-hour spear-phishing campaign targeting defense ministries, logistics operators, and diplomatic entities across nine Eastern European nations, exploiting a Microsoft Office vulnerability within one day of disclosure.

Executive Summary

Between 28 and 30 January 2026, APT28 (Fancy Bear / UAC-0001 / Forest Blizzard) executed a concentrated 72-hour spear-phishing campaign tracked as Operation Neusploit by Zscaler ThreatLabz. The campaign weaponized CVE-2026-21509 β€” a Microsoft Office security feature bypass vulnerability β€” within 24 hours of its public disclosure on 26 January.

Targets spanned at least nine Eastern European nations including Ukraine, Poland, Slovenia, Romania, Slovakia, Turkey, Greece, and the UAE, with lures distributed across defense ministries (40%), transportation and logistics operators (35%), and diplomatic entities (25%). The campaign used compromised government accounts from Romania, Bolivia, and Ukraine as launch platforms, lending institutional credibility to the phishing lures.

Attribution to GRU Unit 26165 is assessed with HIGH confidence based on convergent reporting from CERT-UA, Trellix, Zscaler ThreatLabz, and corroborating open-source intelligence.

Notably, CISA is currently operating at approximately one-third reduced workforce capacity due to Trump-administration cuts that shrank the agency's staffing, with a funding lapse for the Department of Homeland Security further degrading public-private collaboration mechanisms β€” significantly exacerbating the risk posture for private sector entities.

Key Findings

  • CVE-2026-21509 was weaponized within 24 hours of Microsoft's out-of-band disclosure β€” setting a new benchmark for APT28's exploit development speed.
  • Over 60 Ukrainian government email addresses were targeted. CERT-UA tracked the campaign under advisory CERT-UA#19542.
  • At least 29 distinct phishing emails were documented across nine countries by Trellix researchers.
  • Lures leveraged four geopolitically charged themes: fabricated weapons-smuggling alerts (45%), military training invitations (25%), EU/NATO diplomatic consultation requests (20%), and meteorological emergency bulletins (10%).
  • The infection chain was multi-staged and fileless, deploying either MiniDoor (Outlook VBA email stealer) or PixyNetLoader (steganography-based loader deploying a Covenant Grunt implant via filen.io C2).
  • Persistence achieved through COM object hijacking and Outlook macro injection, with payloads operating entirely in memory.

Context on Recent Campaigns

Preceding APT28 Activity (2025)

Between February and September 2025, Recorded Future's Insikt Group tracked APT28 credential-harvesting campaigns against Turkish energy and nuclear agency staff, European think tanks, and organizations in North Macedonia and Uzbekistan. In May 2025, a joint advisory from cybersecurity agencies in 10+ countries confirmed APT28 had been targeting Western logistics and technology companies supporting Ukraine's defense since 2022, spanning air, sea, and rail transportation across NATO member states.

Operation Neusploit Timeline

On 26 January 2026, Microsoft disclosed CVE-2026-21509 and issued an out-of-band security update. Within one day, APT28 operators created weaponized RTF documents exploiting the flaw. By 28 January, CERT-UA observed malicious emails reaching more than 60 email addresses associated with Ukrainian central executive authorities, disguised as communications from the Ukrainian Hydrometeorological Center and EU consultation notices on Ukraine policy. Trellix researchers documented at least 29 distinct phishing emails across nine countries, leveraging four geopolitically charged narrative themes:

  • Fabricated weapons-smuggling alerts (45%)
  • Military training invitations (25%)
  • EU/NATO diplomatic consultation requests (20%)
  • Meteorological emergency bulletins (10%)

The emails originated from compromised government accounts in Romania, Bolivia, and Ukraine, lending them institutional credibility.

Technical Analysis

Initial Access β€” CVE-2026-21509

On 26 January 2026, Microsoft disclosed CVE-2026-21509 and issued an out-of-band security update. The vulnerability resides in Microsoft Office's security feature enforcement, allowing bypass of macro execution restrictions through specially crafted RTF documents. Within one day, APT28 operators created weaponized RTF documents exploiting the flaw. By 28 January, CERT-UA observed malicious emails reaching Ukrainian central executive authorities, disguised as communications from the Ukrainian Hydrometeorological Center and EU consultation notices.

Infection Chain

The technical infection chain was multi-staged and fileless. Successful exploitation of CVE-2026-21509 delivered one of two dropper variants depending on target profile:

  • MiniDoor: A stripped-down Outlook VBA email stealer designed to harvest diplomatic cables, policy documents, and classified communications from high-privilege government accounts.
  • PixyNetLoader: A steganography-based loader that embeds payloads within image files, deploying a Covenant Grunt implant using the legitimate cloud service filen.io as its command-and-control channel.
Infection chain overview
Spear-phishing email (compromised gov account)
  └─> Weaponized RTF attachment
        └─> CVE-2026-21509 exploit (security feature bypass)
              β”œβ”€> MiniDoor (VBA email stealer)
              β”‚     └─> Outlook macro injection (persistence)
              └─> PixyNetLoader (steganography loader)
                    └─> Covenant Grunt implant
                          └─> C2 via filen.io (legitimate cloud)
                                └─> COM object hijacking (persistence)

Tradecraft Evolution

This campaign represents a direct evolution from APT28's September 2025 Operation Phantom Net Voxel, which used similar steganography and Covenant C2 techniques but relied on VBA macros rather than a 1-day exploit for initial access. The shift to rapid exploit weaponization indicates either improved internal exploit development capability or access to a dedicated exploit supply chain.

Code-level overlap between the steganography loader and previously attributed BeardShell malware provides additional attribution confidence. Infrastructure reuse of Filen-based C2 bridging is consistent with the September 2025 campaign.

Source Analysis

English-Language Sources (Trellix, Zscaler, The Hacker News)

Trellix and Zscaler published the most technically granular analyses, providing full infection chain walkthroughs, MITRE ATT&CK mappings, and indicators of compromise. Both attributed the campaign to APT28 with high confidence. The Hacker News added that Microsoft's Threat Intelligence Center (MSTIC) and Google's Threat Intelligence Group (GTIG) co-discovered CVE-2026-21509, suggesting pre-existing government-industry intelligence sharing. The English-language narrative emphasized technical sophistication and weaponization speed.

Ukrainian-Language Sources (CERT-UA, Interfax Ukraine, UNN)

CERT-UA published its advisory under tracking number CERT-UA#19542, formally attributing the activity to UAC-0001. Ukrainian reporting framed the campaign as a direct extension of Russia's war effort, stressing the targeting of 60+ government email addresses. The tone was distinctly more urgent, framing attacks as wartime aggression rather than routine espionage.

German-Language Sources (BSI, Verfassungsschutz)

Germany's BSI and Verfassungsschutz maintain standing advisories on APT28/Unit 26165 as the primary Russian cyber threat to German institutions. In December 2025, Germany publicly attributed the August 2024 cyberattack on German Air Traffic Control to APT28 and announced pursuit of new EU-level sanctions against hybrid actors. German reporting placed greater emphasis on the hybrid warfare dimension, treating cyber operations and disinformation as components of a single Russian strategy.

Key Discrepancies

All source perspectives align on attribution and the CVE-2026-21509 exploitation timeline. Primary divergence lies in framing: technical vendors emphasize tradecraft innovation; Ukrainian sources foreground wartime context; German institutional reporting situates the campaign within a broader hybrid warfare framework. No source disputes the attribution. Notable gap: no sources provide visibility into the campaign's success rate or confirmed compromises beyond targeted email addresses and infrastructure artifacts.

Analyst note: The absence of Russian-language government or media commentary is itself an indicator. Moscow has neither acknowledged nor denied the activity, consistent with its longstanding policy of strategic ambiguity regarding offensive cyber operations.

Threat Actor Profile β€” APT28

Attribution

APT28 (Fancy Bear / UAC-0001 / Forest Blizzard / Pawn Storm / Sednit / STRONTIUM / BlueDelta) is operated by GRU Unit 26165 (85th Main Special Service Center), a military intelligence unit of the Russian Federation's General Staff Main Intelligence Directorate. The U.S. Department of Justice has indicted five GRU Unit 26165 officers. France (April 2025) and Germany (December 2025) have issued public attributions. The UK, EU, and multiple NATO allies have imposed sanctions.

Historical Milestones

  • 2008: Early campaigns targeting Caucasus governments and military organizations.
  • 2015: German Bundestag intrusion, compromising parliamentarian email accounts.
  • 2016: U.S. Democratic National Committee breach; hack-and-leak operations; WADA targeting.
  • 2017: NotPetya destructive attack (coordination with GRU Unit 74455 / Sandworm).
  • 2022–present: Intensified targeting of Ukraine and NATO countries in support of Russia's military campaign.
  • May 2025: Joint advisory from 10+ nations confirming sustained APT28 campaigns against Western logistics companies.
  • Sep 2025: Operation Phantom Net Voxel β€” Covenant Grunt with Filen C2 bridging.
  • Jan 2026: Operation Neusploit β€” CVE-2026-21509 weaponized within 24 hours.

Strategic Objectives

  • Wartime intelligence collection: Mapping logistics networks supplying Ukraine with military equipment and aid.
  • Diplomatic espionage: Harvesting EU and NATO diplomatic communications for advance policy intelligence.
  • Strategic signaling: Demonstrating Russia's ability to penetrate Western networks, reinforcing deterrent effect.

Geopolitical Risk Implications

Winners and Losers

Russia (Short-Term Tactical Winner, Long-Term Strategic Loser): The GRU achieved operational success by compromising Ukrainian government communications and gathering intelligence on EU consultation positions regarding Ukraine, all within a 72-hour window before defenders could fully patch CVE-2026-21509. This intelligence likely feeds directly into Russian military planning and diplomatic positioning. However, the long-term cost is mounting. Each attributed campaign reinforces the political will for sanctions, expulsions, and diplomatic isolation. The EU Council sanctioned 12 individuals and two entities in December 2025 specifically for supporting Russian hybrid threats, including three individuals linked to GRU Unit 29155. Germany announced Schengen-area monitoring of Russian diplomat travel starting January 2026. France publicly condemned APT28 activity as contrary to UN norms of responsible state behavior in cyberspace. The cumulative diplomatic price continues to rise with each new campaign.

Ukraine (Primary Loser, Conditional Beneficiary): Ukraine bears the heaviest direct cost. Over 60 government email addresses were targeted, and the MiniDoor email-stealing capabilities are specifically designed to harvest the diplomatic cables, policy documents, and classified communications that flow through high-privilege government accounts. Compromise of these communications during active wartime carries immediate operational risk. Yet Ukraine is also a conditional beneficiary: each campaign that triggers Western attribution and solidarity strengthens Ukraine's diplomatic position and its argument for continued military and financial support.

NATO and the EU (Conditional Winners): The campaign accelerated a trend building since 2022: the maturation of collective cyber attribution and punitive response. The May 2025 joint advisory from 10+ nations, the December 2025 EU sanctions, the UK and Polish legal actions against GRU operatives, and Germany's public attribution of the air traffic control attack collectively signal that NATO and the EU are developing a functional cyber diplomacy toolbox with real consequences. The limitation: attribution and sanctions have not yet demonstrably deterred APT28's operational tempo. The group has continued to operate at high intensity throughout 2025 and into 2026.

European Logistics and Defense Industries (Clear Losers): The 35% targeting of transportation and logistics operators is not incidental. Everstream Analytics documented a 61% increase in cyberattacks against logistics entities in 2025 (from 132 to 213 incidents), and projects continued escalation in 2026. European port operators, air traffic management systems, rail networks, and defense contractors are now persistent targets, and many lack the cybersecurity maturity to defend against a state-level adversary.

China (Indirect Beneficiary): While unrelated to APT28, the simultaneous pressure from Chinese APT groups (Salt Typhoon, Volt Typhoon, Mustang Panda) targeting telecommunications, critical infrastructure, and Indo-Pacific diplomatic targets means that Western cyber defense resources are stretched across two major state adversaries simultaneously. Russia's campaigns consume attribution and response bandwidth that might otherwise focus on Chinese operations.

Forecast

Response is expected along three parallel tracks in the 90 days following this campaign:

  • Technical response: Microsoft's patch for CVE-2026-21509 will be aggressively pushed through government and defense networks. Organizations that fail to patch within this window become disproportionately vulnerable, as APT28 historically re-exploits known vulnerabilities against slow-moving targets.
  • Diplomatic escalation: Germany's Schengen monitoring regime and December 2025 EU sanctions establish the foundation for further targeted sanctions against GRU officers and entities. France and the UK have signaled willingness to impose additional costs.
  • Offensive response: The pattern of increasing attribution specificity β€” naming GRU units, indicting individual officers β€” suggests an escalatory ladder that could include proportional cyber responses, particularly if APT28 achieves disruptive rather than espionage-focused outcomes.

Risk consideration: Russia may interpret each new sanctions round as confirmation that diplomatic channels are exhausted, potentially lowering the threshold for more aggressive or destructive cyber operations rather than deterring them.

Cross-Industry Sector Risk

The cross-industry risk from APT28's current campaign tempo is substantial and growing. Three factors elevate the threat beyond defense and government targets.

Supply Chain Exposure

APT28's documented targeting of logistics providers, transportation operators, and technology companies since 2022 means that any organization in the supply chain supporting Ukraine-related defense or humanitarian operations is a potential target, regardless of sector. This extends to freight forwarding companies, port terminal operators, aviation service providers, and IT vendors serving government clients.

Collateral Compromise

APT28's use of compromised government email accounts to distribute phishing lures means that private-sector organizations with government contracts or regular correspondence with government entities face elevated risk. The January 2026 campaign used compromised Romanian and Bolivian government accounts as launch platforms, demonstrating that even geographically distant government relationships can become attack vectors.

Tooling Proliferation

APT28's use of open-source frameworks (Covenant) and legitimate cloud services (filen.io) for C2 means that the technical indicators of this campaign overlap with tools used by lower-tier threat actors. Defenders must distinguish between APT28 activity and criminal groups using similar tooling, complicating detection and response. This convergence of state-level and criminal tradecraft increases the noise floor for security operations centers and may delay attribution-informed response decisions.

Recommendations

Immediate Actions

  • Patch CVE-2026-21509 immediately. Apply Microsoft's out-of-band update across all endpoints. Prioritize internet-facing systems and high-privilege user workstations.
  • Hunt for indicators of compromise. Search for MiniDoor, PixyNetLoader, and Covenant Grunt artifacts. Monitor for anomalous filen.io traffic and COM object hijacking persistence mechanisms.
  • Review email security controls. Audit RTF handling policies, macro execution restrictions, and inbound email from government domains in affected countries.

Executive Actions

  • Assess organizational proximity to the conflict. Any relationship with Ukraine defense aid, NATO logistics, or European diplomatic processes elevates risk. Map these relationships and communicate exposure to the board.
  • Review cyber insurance coverage. Confirm that policies cover state-sponsored attacks without war exclusion triggers. The formalization of APT28 attribution may prompt insurer reassessments.
  • Prepare for NIS2 obligations. Organizations in EU essential and important sectors must report significant incidents within 24 hours. Ensure IR plans account for APT28-class events.
  • Engage national CERTs and sector ISACs. Active participation provides early warning and access to restricted indicators not available through open-source reporting.

Strategic Planning

  • Integrate cyber risk into geopolitical scenario planning. APT28's operational tempo is likely to increase alongside battlefield escalation. Cyber risk should be a standing board agenda item.
  • Plan for sustained adversary persistence. APT28 has operated continuously for over 20 years. Defensive strategies should assume ongoing targeting, not isolated incidents.
  • Diversify supply chain dependencies. Organizations reliant on Eastern European logistics corridors should evaluate alternative routing and redundancy.

Indicators to Watch

  • Escalation beyond espionage: A shift from intelligence collection to disruptive or destructive operations (wipers, ransomware, OT compromise) would signal a significant change in Russian risk calculus. Monitor for APT28 tooling in OT environments.
  • New EU/NATO cyber sanctions: Additional sanctions in Q1 2026 could trigger retaliatory Russian cyber operations or diplomatic countermeasures.
  • Further rapid exploit weaponization: If subsequent vulnerabilities are weaponized within 24–48 hours, it indicates improved capability or access to a dedicated exploit supply chain. Track Patch Tuesday disclosures and monitor for immediate in-the-wild exploitation.

Confidence and Limitations

Attribution and campaign characterization: HIGH confidence, based on convergent reporting from CERT-UA, Trellix, Zscaler ThreatLabz, and corroborating OSINT in English, Ukrainian, and German. Geopolitical forecasts carry MODERATE confidence, as they depend on inherently less predictable political variables.

This report relies on open-source and commercially published intelligence. Classified reporting from NATO or national agencies may contain additional details on scope, success rate, or impact not reflected here. The absence of confirmed compromise data beyond targeted email addresses is a recognized gap.

TLP:CLEAR

This report carries no distribution restrictions. Recipients may share, publish, and reference this report freely to support collective defense and situational awareness.