Sunday 8 February 2026Afternoon Edition

ZOTPAPER

News without the noise


Tech

Russian Hackers Already Exploiting New Microsoft Office Zero-Day

Ukraine CERT warns bug went from disclosure to active attacks within days

Nonepaper Staff2 min read
Russia-linked APT28 hackers are actively exploiting a newly disclosed Microsoft Office zero-day vulnerability, with Ukraine's national cyber defense team warning that government agencies and EU organizations are being targeted.

The speed of exploitation has alarmed security researchers, with the vulnerability going from disclosure to active attacks in just days. APT28, also known as Fancy Bear, is associated with Russian military intelligence and has a long history of targeting Western governments and organizations.

Ukraine's Computer Emergency Response Team (CERT-UA) issued an urgent warning about the campaign, noting that the attacks are specifically targeting government systems. The vulnerability affects multiple versions of Microsoft Office and can be exploited through malicious documents.

Microsoft has released a patch for the vulnerability, but organizations that have not yet applied the update remain at risk. The company is urging all users to update immediately.

Analysis

Why This Matters

Rapid weaponization of newly disclosed vulnerabilities by state-sponsored actors underscores the urgency of patch management. Organizations in conflict zones face especially high risks from such attacks.

Background

APT28 has been attributed to Russia's GRU military intelligence agency and has been active since at least 2004. The group has been linked to attacks on the DNC, WADA, and numerous European government targets.

Key Perspectives

Security researchers emphasize that the days-to-exploitation timeline leaves defenders little room for testing before deploying patches. The targeted nature of attacks on Ukraine suggests geopolitical motivations.

What to Watch

Expect the vulnerability to be incorporated into broader criminal campaigns now that exploitation techniques are in the wild. Organizations should prioritize patching and monitor for indicators of compromise.

Sources