Connect with us

Hi, what are you looking for?



Attacks on Russian Government Orgs Exploit Recent Microsoft Office Zero-Day

Threat actors have targeted Russian government organizations with malicious documents designed to exploit the recently patched MSHTML zero-day flaw in Microsoft Office, security researchers with Malwarebytes reveal.

Threat actors have targeted Russian government organizations with malicious documents designed to exploit the recently patched MSHTML zero-day flaw in Microsoft Office, security researchers with Malwarebytes reveal.

Exploits for the MSHTML vulnerability were employed in attacks on at least two organizations in Russia, namely the Joint Stock Company State Rocket Center (JSC GREC Makeyev) and the Ministry of the Interior in Moscow.

Leading to remote code execution and tracked as CVE-2021-40444, the security issue was publicly disclosed on September 7, but attacks targeting it have been observed since mid-August.

Microsoft addressed the bug with its September 2021 Patch Tuesday updates and soon after revealed that ransomware operators had started exploiting it. Previously, the company said the security hole had been used in targeted attacks, hinting at advanced persistent threat (APT) activity.

In a report on Wednesday, Malwarebytes too suggests that an APT is likely behind the recently observed targeting of Russian entities.

“It is rare that we find evidence of cybercrimes against Russian targets. Given the targets, especially the first one, we suspect that there may be a state-sponsored actor behind these attacks, and we are trying to find out the origin of the attacks,” the cybersecurity company says.

The attack on JSC GREC Makeyev — the country’s defense and industrial center for rocket and space technology — employed phishing emails claiming to come from the HR department, which asked recipients to fill out an attached form and send it to HR.

Advertisement. Scroll to continue reading.

Once the recipient opened the attached document, they were asked to enable editing, which immediately triggered the exploit. Through loading a specially crafted ActiveX control, the attacker could run arbitrary code and infect the victim’s machine with malware.

Claiming to arrive from the Russian Ministry of the Interior, the second type of attack also requested the recipient to open an attached form and return it to the sender.

CVE-2021-40444 is likely to be increasingly exploited in attacks, despite involving the use of ActiveX. It is a recent security hole and threat actors are already sharing proof-of-concept code, tutorials, and exploits for it, meaning that a large number of cybercriminals and APTs can now target it.

Related: Chinese Cyberspy Group APT31 Starts Targeting Russia

Related: Russia-Linked Turla APT Uses New Backdoor in Latest Attacks

Related: Hundreds of Thousands of Credentials Leaked Due to Microsoft Exchange Protocol Flaw

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.