Breaking the Kill Bit: Active Exploitation of CVE-2026-21509 in Microsoft Office

    Fast Facts

    • CVE-2026-21509 is a Security Feature Bypass vulnerability in Microsoft Office that allows malicious documents to bypass Kill Bit protections and load restricted OLE/COM components leading to unauthorized code execution.
    • CVE-2026-21509 was disclosed in January 2026 and has been actively exploited in the wild, leading to its inclusion in CISA’s Known Exploited Vulnerabilities (KEV) catalog.
    • Threat actors exploit CVE-2026-21509 using weaponized RTF and Word spearphishing attachments, requiring only the victim to open the document and no macros or additional interaction.
    • APT28 has been observed exploiting CVE-2026-21509 in Operation Neusploit, targeting organizations in Central and Eastern Europe to deliver follow-on malware and establish persistent access.
    Ujwal Thapa

    Ujwal Thapa

    Security Researcher

    Nischal Khadgi

    Nischal Khadgi

    Security Researcher

     

    Overview

    Microsoft disclosed CVE-2026-21509 in early January 2026 as part of an out-of-band security advisory after confirming active exploitation in the wild. According to Microsoft, the vulnerability was identified through coordinated threat intelligence reporting and internal telemetry indicating malicious Microsoft Office documents bypassing established security protections despite up-to-date systems and default configurations.

    This vulnerability is classified as a Security Feature Bypass vulnerability affecting Microsoft Office’s handling of OLE (Object Linking and Embedding) and COM (Component Object Model) objects.

    This flaw is a logic error in the application’s security decision flow. Specifically, it allows attacker-controlled document metadata to influence trust decisions before critical security enforcement checks are performed.

    Vulnerability Type CWE Mapping Attack Vector User Interaction Privileges Required
    Security Feature Bypass CWE-807 – Reliance on Untrusted Inputs in a Security Decision Malicious Office document (RTF / DOCX) Required: Opening the document None

    This class of vulnerability is particularly dangerous because it does not rely on malformed input or crashes; instead, it subverts the intended order of security controls.

    CVE Summary

    With CVE-2026-21509 now listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog and confirmed as actively exploited in the wild, organizations should treat any unpatched Microsoft Office and Microsoft 365 environment as being at significant risk of compromise. Exploitation relies on user interaction with a specially crafted Office document, allowing attackers to bypass built-in security protections and potentially enable follow-on payload execution.

    CVSS & Impact Summary

    CVSS Score Severity Version Vector String
    7.8 High 3.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

    How does CVE-2026-21509 this works?

    To understand the impact of CVE-2026-21509, it is essential to understand the Kill Bit mechanism and its role in Office security.

    The Kill Bit is a Windows registry–based control designed to permanently disable unsafe or deprecated COM / ActiveX components. Once a component is kill-bitted, it must never be instantiated regardless of application, trust level, or user configuration.

    Kill Bits are stored under:

    HKLM\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{CLSID}

     

    With the critical flag:

    Compatibility Flags = 0x00000400

     

    Image-01

    Registry evidence of an ActiveX/COM kill bit

    This mechanism exists because many COM objects, particularly legacy Internet Explorer controls, have historically enabled arbitrary script execution, file access, and remote content loading.

    In a secure, expected scenario, Microsoft Office follows a strict evaluation order when encountering an embedded OLE or COM object:

    1. Parse the embedded object and extract its CLSID

    2. Query the Kill Bit registry

    3. If the CLSID is kill-bitted → block object instantiation

    4. If not kill-bitted, apply secondary controls:

      • Macro policy

      • Protected View

      • Trust Center rules

    5. Load the object only if all checks pass

    In this model, the Kill Bit acts as an absolute veto; it overrides all other trust decisions. Even a fully trusted document cannot load a kill-bit component.

    CVE-2026-21509 introduces a flaw in the ordering of security checks performed by Microsoft Office when processing embedded objects.

    Due to improper trust evaluation logic, Office processes certain document-supplied metadata and flags before enforcing Kill Bit checks. These metadata fields, fully controlled by the document author, can signal that the embedded object originates from a trusted source or safe context.

    As a result:

    • Office prematurely classifies the embedded object as trusted
    • The Kill Bit verification step is skipped or short-circuited
    • Kill-bitted COM objects are instantiated anyway

    In effect, untrusted document content is allowed to override system-level security policy.

    Image-02-1

    Why does this matter?

    CVE-2026-21509 does not introduce new exploit primitives; instead, it resurrects old ones.

    By invalidating the Kill Bit’s authority, the vulnerability re-opens an attack surface that Microsoft intentionally closed years ago. Microsoft intentionally closed these attack surfaces between 2005 and 2014 through the Kill Bit mechanism following widespread ActiveX and Office OLE exploitation, as documented in security bulletins such as MS06-014, CVE-2012-0158 (MS12-027), and CVE-2014-6332, treating Kill Bits as permanent, system-level mitigations. This makes it especially attractive to advanced threat actors, who can leverage well-understood legacy components with predictable behavior and minimal exploit development effort.

    In the campaigns analyzed by Zscaler, APT28 uses CVE-2026-21509 primarily as a reliable initial access mechanism delivered through targeted Spearphishing emails. The threat actors distribute malicious RTF or Word documents crafted to align with the recipient’s language and regional context. Once a victim opens the document, the exploit logic embedded within it enables Microsoft Office to load restricted legacy components, allowing the document to silently retrieve a malicious DLL from attacker-controlled infrastructure. Zscaler observed that this payload delivery is often gated through server-side filtering, ensuring that the malicious content is only served to intended targets while avoiding automated sandbox environments. This initial access technique allows APT28 to transition from document delivery to code execution without relying on macros, scripting engines, or explicit user interaction beyond opening the file.

    In the first observed variant, exploitation of CVE-2026-21509 results in the delivery of MiniDoor, a lightweight and purpose-built dropper focused on email intelligence collection. After the malicious DLL is retrieved and executed, MiniDoor installs a malicious VBA macro project into Microsoft Outlook. This macro is designed to systematically collect email content from multiple folders, including Inbox, Drafts, and Junk, and forward the harvested data to attacker-controlled email accounts. To maintain persistence, the malware modifies the following Outlook registry settings to weaken macro security controls, ensuring that the malicious code continues to execute whenever Outlook is launched.

    Subkey Value Name Value Description
    HKCU\Software\Microsoft\Office\16.0\Outlook\Security Level 1 Enables all macros in Microsoft Outlook.
    Software\Microsoft\Office\16.0\Outlook\Options\General PONT_STRING 0x20 Disables the "Content Download Warning" dialog box.
    Software\Microsoft\Office\16.0\Outlook LoadMacroProviderOnBoot 1 Ensures macro provider loads when the Microsoft Outlook application starts.

    In the second observed variant, exploitation of CVE-2026-21509 leads to the deployment of PixyNetLoader, a more advanced and modular loader designed to establish persistent remote access on the compromised system. After the malicious DLL is retrieved and executed by Microsoft Office, PixyNetLoader performs multiple preparatory actions to ensure long-term persistence and stealth. Unlike the MiniDoor variant, which is narrowly focused on email collection, PixyNetLoader acts as a staging framework that prepares the system for subsequent payload execution. The loader drops additional components to disk, including a loader DLL and an image file that contains encrypted shellcode concealed using steganography. At runtime, PixyNetLoader extracts and decrypts the embedded shellcode from the image file and executes it in memory, avoiding direct execution of suspicious binaries and reducing static detection opportunities.

    To maintain persistence, PixyNetLoader leverages COM hijacking and scheduled task creation, ensuring that the malicious code is executed automatically upon system startup or user logon. In the observed cases, the malware modifies COM registry entries so that a legitimate COM class loads the attacker-controlled DLL instead of the intended system component. Additionally, PixyNetLoader creates a scheduled task masquerading as a legitimate system or application maintenance task, guaranteeing execution even if the initial infection vector is removed.

    schtasks.exe /Create /tn "OneDriveHealth" /XML "%temp%\Diagnostics\office.xml"

     

    The Windows scheduled task is named OneDriveHealth and configured to launch the command below exactly one minute after the task is registered. The OneDriveHealth scheduled task launches the following command:

     %windir%\system32\cmd.exe
    /c (taskkill /f /IM explorer.exe >nul 2>&1) & (start explorer >nul 2>&1) & (schtasks /delete /f /tn OneDriveHealth)

     

    Once persistence is established, the final stage payload a Covenant “Grunt” implant is deployed, providing the threat actor with interactive command execution, file transfer, and further post-exploitation capabilities.

    Persistence Mechanisms Observed in the PixyNetLoader Variant

    Subkey Value Name Value Description
    HKCU\Software\Classes\CLSID\{CLSID} InprocServer32 Path to malicious DLL Hijacks COM object execution to load attacker-controlled DLL.
    HKCU\Software\Classes\CLSID\{CLSID}\InprocServer32 (Default) EhStoreShell.dll Forces execution of the malicious loader when the COM class is invoked.
    HKCU\Software\Microsoft\Windows\CurrentVersion\Run <LegitimateName> Path to loader Ensures execution at user logon (observed in some samples).

    Detecting CVE-2026-21509 with Logpoint

    Required Log Sources

    1. Windows

      1. Process Creation with Command Line Auditing explicitly enabled

    2. Windows Sysmon

    3. Firewall

    4. IDS/IPS

    To detect activity associated with Operation Neusploit and similar Office-based exploitation chains, Logpoint customers can leverage a combination of existing alert rules for high-confidence detection and hunting queries to search for related behaviors across their environment proactively. The alert rules provide immediate visibility into well-defined malicious patterns such as suspicious child processes, scheduled task creation, macro abuse, and unsafe file drops. At the same time, the hunting queries allow analysts to uncover stealthier artifacts like COM hijacking, DLL sideloading, anomalous Office network activity, and payload staging that may otherwise evade point-in-time alerts. Together, these detections offer layered coverage across the attack lifecycle, from initial access through persistence and command-and-control.

    Detections Rules

    Suspicious Child Process Spawned by Microsoft Office Product

    One of the key indicators of abnormal Office application behavior is the suspicious child processes spawned by Office applications. In the context of Operation Neusploit, malicious activity is initiated through Office documents and commonly transitions into the execution of system utilities such as cmd.exe, powershell.exe, schtasks.exe, and rundll32.exe. Monitoring for these process relationships provides an effective early-stage detection trigger, as Office applications are not expected to launch such binaries during normal operation.

    label="Process" label=Create parent_process IN ["*\winword.exe", "*\excel.exe", "*\powerpnt.exe", "*\mspub.exe", "*\visio.exe", "*\outlook.exe","*\msaccess.exe","*\eqnedt32.exe", "*\onenote.exe","*\wordview.exe", "*\onenoteim.exe"] ("process" IN ["*\appvlp.exe","*\bash.exe","*\bitsadmin.exe","*\certoc.exe","*\certutil.exe","*\cmd.exe","*\cmstp.exe","*\control.exe","*\cscript.exe","*\curl.exe","*\forfiles.exe","*\hh.exe","*\ieexec.exe","*\installutil.exe","*\javaw.exe","*\mftrace.exe","*\microsoft.workflow.compiler.exe","*\msbuild.exe","*\msdt.exe","*\mshta.exe","*\msidb.exe","*\msiexec.exe","*\msxsl.exe","*\odbcconf.exe","*\pcalua.exe","*\powershell.exe","*\pwsh.exe","*\regasm.exe","*\regsvcs.exe","*\regsvr32.exe","*\rundll32.exe","*\schtasks.exe","*\scrcons.exe","*\scriptrunner.exe","*\sh.exe","*\svchost.exe","*\verclsid.exe","*\wmic.exe","*\workfolders.exe","*\wscript.exe","*\appdata\*","*\users\public\*","*\programdata\*","*\windows\tasks\*","*\windows\temp\*","*\windows\system32\tasks\*"] OR file IN ["bitsadmin.exe","certoc.exe","certutil.exe","cmd.exe","cmstp.exe","cscript.exe","curl.exe","hh.exe","ieexec.exe","installutil.exe","javaw.exe","microsoft.workflow.compiler.exe","msdt.exe","mshta.exe","msiexec.exe","msxsl.exe","odbcconf.exe","pcalua.exe","powershell.exe","regasm.exe","regsvcs.exe","regsvr32.exe","rundll32.exe","schtasks.exe","scriptrunner.exe","wmic.exe","workfolders.exe","wscript.exe"])

     

    Image-03

     
    Macro File Creation Detected

    For detection purposes, customers can leverage the Macro File Creation Detected alert to identify the creation of macro-enabled Microsoft Office files, which are commonly abused by adversaries to execute malicious code.

    When a macro-enabled Office document is opened, the corresponding macro file is created on the system. This activity can be detected using the following query

    norm_id=WindowsSysmon event_id=11 file in ["*.docm", "*.pptm", "*.xlsm", "*.xlm", "*.dotm", "*.xltm", "*.potm", "*.ppsm", "*.sldm", "*.xlam", "*.xla","*.vdm"]
     
    Scheduled Task Creation Detected

    PixyNetLoader establishes persistence by using scheduled tasks to register a scheduled task named OneDriveHealth. After task creation, the malware follows a predictable restart-and-self-deletion sequence to reduce its on-disk footprint.

    The Scheduled Task Creation Detected alert identifies scheduled task creation either through direct execution of schtasks.exe with task creation arguments while excluding known legitimate parent processes and users, or via registry modifications within the TaskCache registry path.

    (label="Process" label=Create "process"="*\schtasks.exe" command="* /create *" - parent_process IN ["*\Program Files\Microsoft Office\root\Integration\Integrator.exe", "*\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgr.exe"]) OR (label="Registry" label="Key" label="Map" "target_object"="*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\*" -target_object IN ["*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator*"] event_type=CreateKey) OR (norm_id=WinServer event_id=4698 (-command IN ["*MpCmdRun.exe","*msfeedssync.exe","*usoclient.exe", "*\officesvcmgr.exe", "*\OneDriveStandaloneUpdater.exe", "*\OfficeC2RClient.exe", "*\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office*", "*sdxhelper.exe", "*\Program Files (x86)\Google\GoogleUpdater\*updater.exe*", "*platform_experience_helper.exe*"] OR (-task="\CreateExplorerShellUnelevatedTask" command="*explorer.exe")))
     
    Suspicious Scheduled Task Creation

    The Suspicious Scheduled Task Creation alert focuses on identifying scheduled tasks created from locations commonly abused by threat actors, helping to narrow the scope of threat hunting. This detection targets task creation events where the associated command originates from suspicious locations such as user directories, temporary folders, or ProgramData, while excluding known legitimate Windows Defender activity.

    norm_id=WinServer label=Schedule label=Task label=Create command IN ["*C:\Users\*", "*C:\Windows\Temp\*", "*C:\ProgramData\*"] -command="C:\ProgramData\Microsoft\Windows Defender\Platform\*"
     
    Outlook Security Settings Change

    MiniDoor deliberately lowers Outlook macro security by setting the Security\Level registry value to 1, enabling unrestricted macro execution and allowing the dropped VBA project to auto-load without user interaction.

    The Outlook Security Settings Change alert is designed to detect this behavior by monitoring registry value modifications that reduce Outlook’s macro security level. Specifically, it triggers when the Outlook macro security level is set to Level=1, which effectively disables macro protection and is a strong indicator of malicious persistence or execution attempts.

    label=Registry label=Value label=Set target_object="*\Outlook\Security\Level*" detail="DWORD (0x00000001)"

     

    File Dropped in Suspicious Location

    In attacks exploiting CVE-2026-21509, threat actors often use malicious Microsoft Office documents, such as weaponized RTF files, to achieve initial code execution. Once the exploit is triggered, additional payloads are commonly dropped onto disk to establish persistence or enable further malicious activity.

    This alert helps detect this stage by monitoring file creation events in user-writable and commonly abused directories such as AppData, ProgramData, and Public. By filtering out known benign processes and file names, the alert highlights suspicious files that may be dropped as part of the exploitation or post-exploitation workflow, providing early visibility into suspicious activity

    norm_id=WindowsSysmon event_id=11 path IN ["C:\ProgramData*", "*\AppData\Local*", "*\AppData\Roaming*", "C: \Users\Public*"] -"process" IN ["*\Microsoft Visual Studio\Installer\*\BackgroundDownload.exe", "C:\Windows\system32\cleanmgr.exe", "*\Microsoft\Windows Defender\*\MsMpEng.exe", "C:\Windows\SysWOW64\OneDriveSetup.exe", "*\AppData\Local\Microsoft\OneDrive*", "*\Microsoft\Windows Defender\platform\*\MpCmdRun.exe", "*\AppData\Local\Temp\mpam-*.exe", "*\Windows Defender Advanced Threat Protection\MsSense.exe", "*\Windows Defender Advanced Threat Protection\SenseIR.exe", "*\AzureConnectedMachineAgent\*\gc_*.exe", "*\Microsoft Azure AD Sync\Bin\miiserver.exe"] -file IN ["vs_setup_bootstrapper.exe", "DismHost.exe","*_PSScriptPolicyTest*.ps1"]

     

    Image-04

     
    VBA DLL Loaded by Office

    Exploitation of CVE-2026-21509 commonly involves malicious Microsoft Office documents, such as weaponized RTF files, that ultimately enable the execution of embedded VBA code. Once exploitation succeeds, Office applications load the Visual Basic for Applications (VBA) runtime components to execute the attacker-controlled macros or VBA projects, making VBA-related DLL loading a critical execution milestone in the attack chain.

    This alert detects this behavior by monitoring image load events where Office processes load core VBA components and related libraries. When correlated with suspicious document delivery or exploitation activity, this alert helps confirm macro execution or VBA abuse following CVE-2026-21509 exploitation, providing strong evidence of malicious code execution within Office.

    norm_id=WindowsSysmon event_id=7 "process" IN ["*\winword.exe*", "*\powerpnt.exe*", "*\excel.exe*", "*\outlook.exe*"] image IN ["*\VBE7.DLL*", "*\VBEUI.DLL*", "*\VBE7INTL.DLL*"]

     

    Hunting Query

    The queries below are intended to support threat hunting by helping analysts identify indicators related to CVE-2026-21509 exploitation activity.

    1. Hunt for Neusploit COM hijack

    Operation Neusploit leverages a COM hijacking technique as a persistence and execution mechanism following successful exploitation of CVE-2026-21509. By registering a malicious DLL under a specific CLSID, the attacker ensures their payload is loaded whenever the associated COM object is instantiated. The use of a predictable CLSID and DLL path has been explicitly documented in Neusploit-related activity, making this behavior a high-confidence indicator of compromise.

    This hunting query enables analysts to identify registry modifications that map a known Neusploit-associated CLSID to a malicious InProcServer32 DLL, including instances where the payload is stored in ProgramData or uses the known EhStoreShell.dll name. By detecting exact CLSID and DLL path combinations, the query helps surface COM hijacking attempts tied specifically to Neusploit, allowing analysts to quickly confirm persistence mechanisms and scope affected systems.

    label=Registry label=Set label=Value target_object="*\Software\Classes\CLSID\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D}\InProcServer32*" (detail="*\ProgramData\USOPublic\Data\User\EhStoreShell.dll*" OR detail="*EhStoreShell.dll*")
     
    2. Generic COM hijack hunt (InProcServer32 pointing outside system folders)

    Generic COM hijacking is a commonly abused persistence and execution technique observed inCVE-2026-21509 related activity, including Operation Neusploit. Following successful exploitation via malicious Office documents, attackers may register malicious DLLs under COM CLSIDs to ensure code execution when the COM object is invoked, even if the exact CLSID differs from known campaigns.

    This hunting query helps analysts detect such activity by identifying InProcServer32 registry values that point to DLLs outside trusted system directories such as System32, SysWOW64, and Program Files. By surfacing COM registrations that resolve to user-writable or uncommon paths, the query enables analysts to uncover previously unknown or customized COM hijacking attempts used for persistence or stealthy execution.

    label=Registry label=Set label=Value target_object="*\Software\Classes\CLSID\*\InProcServer32*" -detail IN ["*\Windows\System32\*","*\Windows\SysWOW64\*","*\Program Files\*","*\Program Files (x86)\*"]
     
    3. Hunt for Neusploit OneDriveHealth Scheduled Task Persistence

    In Operation Neusploit, threat actors establish persistence by creating a scheduled task named OneDriveHealth using schtasks.exe, often leveraging an XML task definition. This behavior occurs after successful exploitation of CVE-2026-21509 and is paired with a deliberate restart-and-cleanup routine terminating Explorer and deleting the task registration artifacts to reduce forensic visibility.

    This hunting query enables analysts to identify both stages of the Neusploit persistence mechanism: the creation of the OneDriveHealth scheduled task and the subsequent command-line activity used to restart Explorer and delete task artifacts. By correlating schtasks.exe execution with the specific task name and cleanup commands, the query provides high-confidence detection of Neusploit-associated persistence and post-exploitation behavior.

    label="Process" label=Create (("process"="*\schtasks.exe" command="* /Create *" command="*OneDriveHealth*" command="* /XML *office.xml*") OR ("process"="*\cmd.exe" command="*/c*" command="*taskkill*" command="*explorer.exe*" command="*schtasks*delete*" command="*OneDriveHealth*"))
     
    4. Hunt for MiniDoor Outlook VBA project drop

    In MiniDoor-related activity associated with CVE-2026-21509, attackers abuse Microsoft Outlook by dropping a malicious VBA project that is automatically loaded by Outlook at startup. By writing a malicious VbaProject.OTM file into the Outlook profile directory, the attacker gains persistent code execution without requiring further user interaction, especially after macro security settings are weakened.

    This hunting query helps analysts identify the creation of VbaProject.OTM within Outlook-specific directories by monitoring file creation events. Since legitimate creation or modification of this file is rare outside of intentional macro development, detecting its appearance provides a strong indicator of malicious VBA persistence. When correlated with Outlook security setting changes or Office exploitation alerts, this query helps confirm successful post-exploitation and persistence via Outlook VBA abuse.

    norm_id=WindowsSysmon event_id=11 file="VbaProject.OTM" path="*\Microsoft\Outlook\"
     
    5. Hunt for Suspicious Outlook Startup and Macro Registry Changes

    In campaigns exploiting CVE-2026-21509, attackers abusing Microsoft Outlook often go beyond simply lowering macro security settings to establish durable persistence. Additional Outlook-specific registry values can be modified to influence macro loading behavior and Outlook startup execution, enabling malicious VBA projects to be automatically loaded without further user interaction.

    This hunting query enables analysts to detect registry value modifications associated with Outlook persistence mechanisms, including changes to macro security levels, macro provider loading behavior, and Outlook startup options. By monitoring these registry paths collectively, the query helps surface suspicious attempts to maintain persistence through Outlook configuration abuse, even when attackers avoid using a single, well-known registry key.

    label=Registry label=Set label=Value target_object IN ["*\Software\Microsoft\Office\*\Outlook\Security\Level*", "*\Software\Microsoft\Office\*\Outlook\Options\General\PONT_STRING*", "*\Software\Microsoft\Office\*\Outlook\LoadMacroProviderOnBoot*"]
     
    6. PixyNetLoader Artifact File Drop Artifacts

    In APT28 campaigns linked to CVE-2026-21509, PixyNetLoader is used as a post-exploitation component to stage payloads and establish persistence. As documented in Neusploit-related activity, the loader drops a small set of distinctive files into predictable directories under ProgramData and Temp, which are later referenced for COM hijacking and scheduled task execution.

    This hunting query enables analysts to identify file creation events associated with PixyNetLoader by monitoring for the drop of known loader-related artifacts, such as EhStoreShell.dll, SplashScreen.png, and office.xml, in their expected directories. Detection of these files provides high-confidence evidence of PixyNetLoader staging and can be used to quickly confirm compromise and scope affected systems when correlated with COM hijack or scheduled task alerts.

    (norm_id=WindowsSysmon event_id=11 ((file="EhStoreShell.dll" path="*\ProgramData\USOPublic\Data\User\") OR (file="SplashScreen.png" path="*\ProgramData\Microsoft OneDrive\setup\Cache\") OR (file="office.xml" path="*\Temp\Diagnostics\")))
     
    7. Hunt for Office Applications Initiating Network Connections Over Uncommon Ports

    Analysts can use the following hunting query from SigmaHQ to hunt for outbound network connections initiated by Microsoft Office apps when they communicate over uncommon destination ports, excluding typical web/DNS/SMB and standard Outlook mail ports, to help surface potential C2 or evasion activity

    label=Detect label=Connection label=Network is_initiated="true" "process" IN ["*\excel.exe", "*\outlook.exe", "*\powerpnt.exe", "*\winword.exe", "*\wordview.exe"] -(destination_port IN [53, 80, 139, 389, 443, 445, 3268] OR ("process"="*:\Program Files\Microsoft Office\*" "process"="*\OUTLOOK.EXE" destination_port IN [143, 465, 587, 993, 995]))
     
    8. Hunt for known malicious domains

    Analysts can use the following query to hunt for activity associated with known indicators of compromise (IOCs).

    url IN ["*freefoodaid.com*","*wellnesscaremed.com*"] OR domain IN ["freefoodaid.com","wellnesscaremed.com"] OR dns_query IN ["freefoodaid.com","wellnesscaremed.com"]

     

    Mitigation and response priorities

    • Patch immediately, as the vulnerability is being actively exploited and emergency fixes are available.
    • Actively look for these signs of attack:
      • Creation of scheduled tasks that restart Explorer and then delete themselves
      • Suspicious registry changes linked to COM hijacking (the documented CLSID)
      • Outlook security changes that lower macro protections or auto-load macro providers
    • Block or closely monitor connections to the known malicious domains wherever possible.

    Conclusion

    CVE-2026-21509 illustrates that "security feature bypass" vulnerabilities can enable full, multi-stage compromise when combined with delivery tradecraft and robust post-exploitation persistence. In Operation Neusploit, APT28 combines a weaponized RTF exploit with Outlook VBA persistence (MiniDoor) and COM hijacking scheduled tasks (PixyNetLoader), resulting in prolonged access and data theft.