Russian hackers attacking European maritime and transport orgs using Microsoft Office exploit
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我先看看这篇文章讲的是什么。 文章提到俄罗斯的黑客组织APT28(也叫Fancy Bear)利用微软Office的一个漏洞进行网络攻击。这些攻击针对乌克兰、北约国家以及一些东欧国家的政府机构和公共部门。他们使用了鱼叉式网络钓鱼邮件,邮件看起来像政府文件,实际上带有恶意软件,用来窃取数据和植入后门。 我需要把这些信息浓缩到100字以内。首先,确定主要点:俄罗斯黑客组织、利用Office漏洞、针对哪些国家、攻击手段和目的。 然后,组织语言,确保简洁明了。可能的结构是:俄罗斯黑客利用漏洞攻击多国政府机构,使用鱼叉式邮件和恶意软件窃取数据。 最后检查字数,确保不超过限制。嗯,这样应该可以了。 </think> 俄罗斯黑客组织APT28利用微软Office漏洞发起网络攻击,针对乌克兰、北约国家及东欧地区的政府机构和公共部门。攻击通过鱼叉式网络钓鱼邮件传播恶意文档,植入间谍软件窃取数据并建立后门。 2026-2-5 16:46:11 Author: therecord.media(查看原文) 阅读量:0 收藏

Researchers have uncovered additional cyberattacks carried out by Russian state-linked hackers exploiting a Microsoft Office vulnerability as part of what they described as a “sophisticated espionage campaign.”

The activity has been linked to APT28, or Fancy Bear, a Kremlin-backed hacking group that has targeted Ukraine and NATO-aligned countries for more than two decades. 

Earlier this week, Ukraine’s computer emergency response team, CERT-UA, and cybersecurity firm Zscaler reported attacks by the group via the same vulnerability against Ukrainian government agencies and public sector organizations in Slovakia and Romania.

In a report released Wednesday, researchers at the cybersecurity firm Trellix said they observed broader APT28 activity targeting maritime, transportation and diplomatic entities in countries including Poland, Slovenia, Turkey, Greece and the United Arab Emirates.

According to the report, the attacks were part of a “concentrated” 72-hour spearphishing campaign that sent at least 29 distinct emails across nine Eastern European countries.

The hackers exploited a newly disclosed Microsoft Office vulnerability, tracked as CVE-2026-21509, shortly after Microsoft revealed the flaw in late January.

The campaign began with phishing emails carrying malicious Office documents that triggered the exploit automatically, without requiring user interaction, Trellix said. The messages were sent from compromised government email accounts in several countries, including Romania, Bolivia and Ukraine.

Trellix said the attackers used geopolitically themed lures such as weapons-smuggling alerts, NATO and European Union diplomatic invitations, military training notices and emergency weather bulletins. The attached documents were designed to resemble legitimate government correspondence and may have been based on previously stolen material.

Once opened, the files deployed a series of tools, including MiniDoor malware designed to steal email data and PixyNetLoader, which ultimately installed a Covenant backdoor on infected systems, the report said.

The campaign also made extensive use of legitimate cloud services to obscure malicious activity. Trellix said APT28 used the cloud storage platform Filen as a command-and-control channel, allowing the malware to blend in with normal internet traffic.

The hacker group has stepped up operations against Ukraine and its European allies since Russia’s full-scale invasion in 2022 and has a history of rapidly exploiting newly disclosed Office vulnerabilities, often becoming one of the first groups to use them in real-world attacks, according to researchers.

“The use of CVE-2026-21509 demonstrates how quickly state-aligned actors can weaponize new vulnerabilities, shrinking the window for defenders to patch critical systems,” Trellix said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russian-hackers-microsoft-office-europe
如有侵权请联系:admin#unsafe.sh