top of page

Threat Brief: February 5, 2026 - APT28 Goes Live, Supply Chains Under Fire

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 5
  • 3 min read

# Threat Brief: February 5, 2026 - APT28 Goes Live, Supply Chains Under Fire


**TL;DR:** APT28 is actively exploiting a new Microsoft Office vulnerability (CVE-2026-21509) targeting European military. Notepad++ supply chain compromised by Chinese actors. New ransomware syndicate hit 71 organizations in 48 hours. Russian wipers targeting Polish infrastructure. Patch now or pay later.




Priority 1: APT28 Operation Neusploit



**Status:** ACTIVE EXPLOITATION


Russia's APT28 (Fancy Bear) weaponized CVE-2026-21509 within 24 hours of disclosure.


**Targets:**

- European military and government

- Maritime and transport organizations

- Ukraine, Slovakia, Romania, Poland, Slovenia, Turkey, Greece, UAE


**Kill Chain:**

1. Malicious RTF/LNK files delivered via spear-phishing

2. CVE-2026-21509 bypass triggers shellcode loader

3. Steganographic payload hidden in SplashScreen.png

4. BEARDSHELL implant establishes persistence

5. NotDoor backdoor hijacks Outlook for C2


**Indicators:**

- `[email protected]` - threat actor email

- `[email protected]` - threat actor email

- BEARDSHELL - C++ implant

- NotDoor/GONEPOSTAL - Outlook VBA backdoor

- MiniDoor - email stealer


**Action:** Patch Microsoft Office immediately. Block IOCs at email gateway.




Priority 2: Supply Chain Attacks



Notepad++ Compromised (Lotus Blossom)



China-linked Lotus Blossom compromised Notepad++ distribution infrastructure. Users who downloaded the editor received the Chrysalis backdoor.


**Action:** Verify Notepad++ installation hashes. Check for unauthorized network connections.


eScan Antivirus Compromised



MicroWorld Technologies suffered supply-chain attack. Malicious updates pushed through legitimate eScan updater.


**Action:** If running eScan, isolate systems and investigate.




Priority 3: New Ransomware Threat



0APT RaaS Syndicate



Emerged January 28, 2026. Compromised 71 organizations within 48 hours.


**TTPs:**

- AES-256/Salsa20 encryption

- Double extortion (encrypt + leak)

- Rapid deployment capability


**Action:** Verify backup integrity. Review network segmentation.




Priority 4: Wiper Attacks on Poland



Static Tundra Campaign



Russia-linked group targeting Polish energy and manufacturing sectors.


**Attack Path:**

1. Initial access via FortiGate SSL VPN

2. Reconnaissance and lateral movement

3. DynoWiper and LazyWiper deployment

4. Firmware damage and file corruption


**Action:** Patch Fortinet devices (CVE-2026-24858). Implement network monitoring.




Critical Vulnerabilities (Patch Now)



| CVE | Product | CVSS | Status |

|-----|---------|------|--------|

| CVE-2026-21509 | Microsoft Office | 7.8 | **APT28 ACTIVE** |

| CVE-2026-24858 | Fortinet FortiCloud | 9.4 | **ACTIVE EXPLOITATION** |

| CVE-2026-23760 | SmarterMail | High | **ACTIVE EXPLOITATION** |

| CVE-2026-24423 | SmarterMail | Critical | Exploit available |

| CVE-2025-8088 | WinRAR | High | **ACTIVE EXPLOITATION** |




Emerging Threats



RedKitten Campaign



LLM-assisted malware development targeting Iranian activists and NGOs.

- Password-protected Excel lures

- SloppyMIO implant with Telegram C2

- First confirmed AI-assisted threat campaign in 2026


Clawdbot Exposure



900+ exposed Clawdbot AI agent instances identified. Enables credential theft and RCE through misconfigured deployments.




IOCs Added to Index



19 new indicators indexed to DugganUSA threat intel:

- 5 CVEs (actively exploited)

- 7 malware families

- 2 threat actor emails

- 4 threat actor profiles

- 1 campaign tracker


Search at: `https://analytics.dugganusa.com/api/v1/search?q=APT28&indexes=iocs`




Recommended Actions



1. **Immediate:** Patch Microsoft Office (CVE-2026-21509)

2. **Immediate:** Patch Fortinet products (CVE-2026-24858)

3. **24 Hours:** Verify Notepad++ installations

4. **24 Hours:** Review FortiGate VPN logs

5. **This Week:** Audit backup and recovery procedures

6. **This Week:** Implement email attachment sandboxing




Attribution Summary



| Actor | Nation | Current Campaign |

|-------|--------|------------------|

| APT28 | Russia | Operation Neusploit (EU military) |

| Static Tundra | Russia | Polish infrastructure wipers |

| Lotus Blossom | China | Notepad++ supply chain |

| RedKitten | Unknown | Iranian activists (LLM-assisted) |

| 0APT | Unknown | Mass ransomware deployment |




*Published by DugganUSA LLC - Minnesota-based threat intelligence.*


*Stay frosty. Patch fast. Trust nothing.*




Sources



- [Check Point Threat Intelligence Report](https://research.checkpoint.com/2026/2nd-february-threat-intelligence-report/)

- [APT28 CVE-2026-21509 Campaign - The Hacker News](https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html)

- [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)

- Zscaler ThreatLabz

- Polish CERT






*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page