Microsoft pushed an emergency, out-of-band patch for a Microsoft Office zero-day on January 26, and Ukraine’s national CERT says attackers moved fast to weaponize it. The case is a reminder of how narrow the window can be between “vulnerability is publicly acknowledged” and “campaigns are active in the wild,” especially when the targets are government and policy organizations.
The most useful way to read incidents like this isn’t as an isolated Office bug, but as a familiar playbook: realistic-themed documents, delivery to a curated list of recipients, and a multi-step execution chain that tries to blend into normal Windows behavior.
What was reported about CVE-2026-21509
According to BleepingComputer’s write-up and CERT-UA’s reporting, the key timeline points look like this:
- January 26: Microsoft issues an emergency, out-of-band update and marks CVE-2026-21509 as a zero-day under active exploitation.
- Within days: CERT-UA detects malicious Word documents exploiting the vulnerability.
- The lures are not generic spam. One theme referenced EU COREPER consultations related to Ukraine, and other messages impersonated the Ukrainian Hydrometeorological Center, going to dozens of government-linked addresses.
CERT-UA attributed the activity to APT28 (also known as Fancy Bear/Sofacy, associated in public reporting with Russia’s GRU).
The takeaway: once a patch drops for a known-zero-day, defenders often treat that as “the danger is over.” In reality, that moment can also be the attacker’s signal that the exploit details are about to become easier to reproduce, share, or reverse engineer.
How Office attacks still work in 2026: document lures and trust boundaries
Office documents remain a high-leverage delivery vehicle because they sit at a sweet spot:
- They are a normal part of business and government workflows.
- Users are accustomed to opening them quickly.
- They can carry content that looks authoritative (meeting agendas, policy drafts, internal memos).
Modern Office defenses have made simple macro-based attacks less reliable in many environments, so campaigns often shift to different trust boundaries:
- Exploiting parsing/rendering bugs that trigger on open or on preview.
- Abusing network-enabled features (like remote templates, WebDAV, or external content fetching) to pull down second-stage payloads.
- Leveraging Windows components (COM objects, scheduled tasks, DLL search order) to persist or execute.
In the reporting here, the delivery chain includes a WebDAV-based download step and then “living off the land” style techniques (COM hijacking, scheduled tasks) that try to look like normal system behavior.
The execution chain described by CERT-UA (and why it’s hard to spot)
BleepingComputer summarizes CERT-UA’s findings as a multi-step chain that includes:
- WebDAV download behavior
- COM hijacking (a way to redirect a legitimate COM object load to attacker-controlled code)
- A malicious DLL named EhStoreShell.dll
- Shellcode hidden inside an image file (named SplashScreen.png)
- A scheduled task (reported as OneDriveHealth) that helps trigger execution and persistence
Even without replicating the exact technical steps, you can see the strategy:
- Don’t drop a single obvious EXE and run it.
- Blend into Windows conventions (DLLs, scheduled tasks, Explorer restarts).
- Make the “interesting” payload appear late (shellcode inside an image, framework staged later).
That style is valuable to attackers because it disrupts simplistic defenses that focus only on file extensions or on spotting clearly malicious executables.
Why “patch fast” is necessary but not sufficient
It’s tempting to reduce the response to “apply the patch,” and that is still the primary action. But in a real organization, patching has friction:
- some endpoints are offline or unmanaged
- some business-critical systems are slow to reboot
- some users keep applications open, preventing updates from applying
This campaign illustrates why layered controls matter:
- Protected View / Mark-of-the-Web protections: Microsoft has invested in stopping “files from the Internet” from behaving like trusted documents. That only helps if the file gets the correct provenance markers and users can’t easily bypass them.
- Egress monitoring: CERT-UA noted use of Filen (filen.io) as command-and-control infrastructure. Even if you can’t fully block cloud services, watching for unusual endpoints and patterns can give you a detection path when endpoint indicators are missed.
- Privilege and application control: The more you can restrict what Office and related processes can spawn or load (especially in high-risk departments), the more you shrink the attacker’s options.
In other words: patching closes the front door, but a capable actor often still tries windows and side doors until they hit the one machine that is late to update.
What defenders can do immediately (practical, not panic)
If you’re in an org that uses Office broadly, the actions that usually pay off are boring and measurable:
- Confirm patch coverage for Office 2016/2019/LTSC variants and Microsoft 365 Apps across endpoints.
- Require application restarts where Microsoft’s update model needs them for the fix to take effect.
- Hunt for anomalous scheduled tasks (especially ones mimicking legitimate product names) and unusual Explorer restart patterns on endpoints that opened recent external documents.
- Review WebDAV exposure and policy. If WebDAV isn’t needed, disable it or restrict it. If it is needed, focus on monitoring and allowlisting.
- Add detection for known IOCs from CERT-UA’s report as a short-term measure, and translate them into behavior-based rules over time.
None of these are perfect, but together they turn “one user opened one file” into an event that’s more likely to be contained.
Why this matters beyond Ukraine
CERT-UA’s investigation suggested that additional documents were used to target EU-based organizations, not just Ukrainian entities. That’s consistent with how geopolitically motivated campaigns scale:
- Start with the most obvious targets.
- Reuse infrastructure and tooling against adjacent groups (partners, institutions, international bodies).
- Iterate based on what works.
For defenders outside the immediate conflict zone, that’s the key lesson: the same exploit chain can show up in your environment even if you aren’t the “headline target.”
Bottom line
A zero-day patch doesn’t end the story; it often starts a race. When a vulnerability is confirmed as actively exploited, the critical window is the first days and weeks after disclosure—when attackers are updating lures and defenders are still trying to reach full patch coverage.