APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。好的,首先我需要快速浏览一下文章内容。 文章主要讲的是微软修补了一个安全漏洞CVE-2026-21513,评分8.8,属于高危。这个漏洞被Akamai发现可能被俄罗斯支持的APT28利用。漏洞允许攻击者绕过安全机制,通过恶意HTML或LNK文件进行攻击。微软已经在二月的更新中修复了这个漏洞,并提到它曾被用作零日攻击。 然后,Akamai提到他们在VirusTotal上发现了一个恶意样本,与APT28有关。这个样本还关联到另一个Office漏洞CVE-2026-21509。漏洞的核心问题在于ieframe.dll处理超链接导航时的逻辑错误,导致URL验证不足,让攻击者能够执行恶意代码。 总结下来,我需要涵盖:微软修补了高危漏洞CVE-2026-21513;该漏洞可能被APT28用于零日攻击;通过恶意文件绕过安全机制;以及微软修复的情况。 控制在一百字以内的话,可能需要简化一些细节。比如提到微软修复、APT28关联、零日利用、恶意文件类型以及绕过机制。 好的,现在试着组织语言: 微软修补了高危漏洞CVE-2026-21513(CVSS 8.8),该漏洞可能被俄罗斯支持的APT28用于零日攻击。攻击者通过恶意HTML或LNK文件绕过安全机制,利用MSHTML框架中的逻辑错误触发ShellExecuteExW执行恶意代码。 这样大概在一百字左右吗?数一下:73个字左右。看起来不错。 </think> 微软修补了高危漏洞CVE-2026-21513(CVSS 8.8),该漏洞可能被俄罗斯支持的APT28用于零日攻击。攻击者通过恶意HTML或LNK文件绕过安全机制,利用MSHTML框架中的逻辑错误触发ShellExecuteExW执行恶意代码。 2026-3-2 10:36:0 Author: thehackernews.com(查看原文) 阅读量:13 收藏

Vulnerability / Threat Intelligence

A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai.

The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework.

"Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network," Microsoft noted in its advisory for the flaw. It was fixed by the Windows maker as part of its February 2026 Patch Tuesday update.

However, the tech giant also noted that the vulnerability had been exploited as a zero-day in real-world attacks, crediting the Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), and Office Product Group Security Team, along with Google Threat Intelligence Group (GTIG), for reporting it.

In a hypothetical attack scenario, a threat actor could weaponize the vulnerability by persuading a victim to open a malicious HTML file or shortcut (LNK) file delivered through a link or as an email attachment.

Once the crafted file is opened, it manipulates browser and Windows Shell handling, causing the content to be executed by the operating system, Microsoft noted. This, in turn, allows the attacker to bypass security features and potentially achieve code execution.

While the company has not officially shared any details about the zero-day exploitation effort, Akamai said it identified a malicious artifact that was uploaded to VirusTotal on January 30, 2026, and is associated with infrastructure linked to APT28.

It's worth noting that the sample was flagged by the Computer Emergency Response Team of Ukraine (CERT-UA) early last month in connection with APT28's attacks exploiting another security flaw in Microsoft Office (CVE-2026-21509, CVSS score: 7.8).

The web infrastructure company said CVE-2026-21513 is rooted in the logic within "ieframe.dll" that handles hyperlink navigation, and that it's the result of insufficient validation of the target URL, which allows attacker-controlled input to reach code paths that invoke ShellExecuteExW. This, in turn, enables execution of local or remote resources outside the intended browser security context.

"This payload involves a specially crafted Windows Shortcut (LNK) that embeds an HTML file immediately after the standard LNK structure," security researcher Maor Dahan said. "The LNK file initiates communication with the domain wellnesscaremed[.]com, which is attributed to APT28 and has been in extensive use for the campaign's multistage payloads. The exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries."

Akamai noted that the technique makes it possible for an attacker to bypass Mark-of-the-Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC), leading to a downgrade of the security context and ultimately facilitating the execution of malicious code outside of the browser sandbox via ShellExecuteExW.

"While the observed campaign leverages malicious LNK files, the vulnerable code path can be triggered through any component embedding MSHTML," the company added. "Therefore, additional delivery mechanisms beyond LNK-based phishing should be expected."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html
如有侵权请联系:admin#unsafe.sh