Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Overwatch Coming To Fortnite Feels Desperate For Both Parties

    May 13, 2026

    The Big Bang Theory Is Now An Apocalyptic Nightmare In Stuart Fails To Save the Universe Trailer

    May 13, 2026

    BMW Teases New 3 Series Touring. Explains Why The Wagon Lives On

    May 13, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Microsoft releases urgent Office patch. Russian-state hackers pounce.
    Microsoft releases urgent Office patch. Russian-state hackers pounce.
    Tech Reviews

    Microsoft releases urgent Office patch. Russian-state hackers pounce.

    gvfx00@gmail.comBy gvfx00@gmail.comFebruary 5, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Russian-state hackers wasted no time exploiting a critical Microsoft Office vulnerability that allowed them to compromise the devices inside diplomatic, maritime, and transport organizations in more than half a dozen countries, researchers said Wednesday.

    The threat group, tracked under names including APT28, Fancy Bear, Sednit, Forest Blizzard, and Sofacy, pounced on the vulnerability, tracked as CVE-2026-21509, less than 48 hours after Microsoft released an urgent, unscheduled security update late last month, the researchers said. After reverse-engineering the patch, group members wrote an advanced exploit that installed one of two never-before-seen backdoor implants.

    Table of Contents

    Toggle
    • Stealth, speed, and precision
      • Related posts:
    • Ars Live: Is the AI bubble about to pop? A live chat with Ed Zitron.
    • Update your iPhone now — Apple issues a rare warning to iOS users as a new hacker threat is discover...
    • NYT Strands hints and answers for Friday, February 13 (game #712)

    Stealth, speed, and precision

    The entire campaign was designed to make the compromise undetectable to endpoint protection. Besides being novel, the exploits and payloads were encrypted and ran in memory, making their malice hard to spot. The initial infection vector came from previously compromised government accounts from multiple countries and were likely familiar to the targeted email holders. Command and control channels were hosted in legitimate cloud services that are typically allow-listed inside sensitive networks.

    “The use of CVE-2026-21509 demonstrates how quickly state-aligned actors can weaponize new vulnerabilities, shrinking the window for defenders to patch critical systems,” the researchers, with security firm Trellix, wrote. “The campaign’s modular infection chain—from initial phish to in-memory backdoor to secondary implants was carefully designed to leverage trusted channels (HTTPS to cloud services, legitimate email flows) and fileless techniques to hide in plain sight.”

    The 72-hour spear phishing campaign began January 28 and delivered at least 29 distinct email lures to organizations in nine countries, primarily in Eastern Europe. Trellix named eight of them: Poland, Slovenia, Turkey, Greece, the UAE, Ukraine, Romania, and Bolivia. Organizations targeted were defense ministries (40 percent), transportation/logistics operators (35 percent), and diplomatic entities (25 percent).

    Related posts:

    Get one year of access for only $35

    Admins and defenders gird themselves against maximum-severity server vuln

    China wants to counter drone swarms using high power microwave weapons similar in principle to house...

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe Best Upcoming Cozy Games To Keep On Your Radar In 2026
    Next Article The Absolute Insanity of Moltbook
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Sony’s Xperia 1 VIII Has Bigger Camera Sensors And A New Look

    May 13, 2026
    Tech Reviews

    Today’s NYT Mini Crossword Answers for May 13

    May 13, 2026
    Tech Reviews

    ‘Your Wi-Fi cable could be a secret microphone’: How researchers turned an earthquake detection method into an accidental spy tool using AI

    May 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025151 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202584 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202578 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025151 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202584 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202578 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.