CyberLeveling Logo
APT Campaigns Increasingly Exploiting CVE-2026-21509

APT Campaigns Increasingly Exploiting CVE-2026-21509

February 24, 2026

Over the past few weeks, there has been a noticeable rise in targeted intrusion campaigns leveraging CVE-2026-21509, a serious vulnerability affecting Microsoft Office. What initially appeared as isolated exploitation has evolved into broader operational use, suggesting that advanced persistent threat (APT) actors are actively incorporating this flaw into their playbooks.

This is no longer theoretical risk. It’s being used in the wild.

What CVE-2026-21509 Is

CVE-2026-21509 is a security feature bypass vulnerability in Microsoft Office.

In practical terms, it allows a specially crafted document to circumvent built-in Office protections that are designed to prevent unsafe components from executing. The flaw stems from Office trusting certain inputs during security decision-making. An attacker can abuse this logic issue to bypass internal safeguards and trigger unauthorized code execution once a victim opens a malicious file.

This makes the vulnerability particularly dangerous in phishing scenarios, where a single document attachment can act as the initial access vector into a larger compromise.

Who Is Affected

The vulnerability impacts several widely deployed Office versions:

  • Microsoft Office 2016
  • Microsoft Office 2019
  • Office LTSC 2021
  • Office LTSC 2024
  • Microsoft 365 Apps for Enterprise

Any unpatched installation of these versions remains exposed.

How APT Groups Are Using It

What stands out is how this vulnerability is being operationalized.

Instead of broad spam campaigns, CVE-2026-21509 is appearing in targeted phishing operations. Attackers are sending carefully tailored emails containing malicious Word or RTF documents aimed at specific organizations, departments, or individuals.

Once the document is opened:

  1. The exploit executes inside the Office process.
  2. Built-in protections are bypassed.
  3. A secondary payload is launched.
  4. Post-exploitation activity begins.

From there, attackers establish persistence, escalate privileges, move laterally, and exfiltrate data.

As awareness of the vulnerability spreads and proof-of-concept details circulate, more threat actors appear to be integrating it into their toolkits. That pattern is common with high-impact Office vulnerabilities: once proven reliable, they quickly become a standard initial access method.


Process Spawn Behavior: What You’ll See in Telemetry

The exploit begins inside the Office application itself, but the real signal appears when it spawns child processes that Word or Excel normally should not launch.

Common Parent Processes

  • WINWORD.EXE (most common)
  • EXCEL.EXE
  • POWERPNT.EXE
  • Occasionally OUTLOOK.EXE (preview abuse scenarios)

Suspicious Child Processes

The following child processes are strong indicators of exploitation:

Command and Scripting Engines

powershell.exe, pwsh.exe, cmd.exe, wscript.exe, cscript.exe

Typical chain: WINWORD.EXE → powershell.exe → payload download

Living-off-the-Land Binaries (LOLBins)

mshta.exe, rundll32.exe, regsvr32.exe, msbuild.exe, wmic.exe, schtasks.exe

Example: WINWORD.EXE → mshta.exe → remote HTA payload

Direct Payload Execution

WINWORD.EXE → dropped_payload.exe or WINWORD.EXE → cmd.exe → payload.exe

What’s Normal vs. Suspicious

In most enterprise environments, Microsoft Word should not spawn scripting engines or system utilities.

If you observe:

ParentImage = WINWORD.EXE
ChildImage IN (powershell.exe, cmd.exe, mshta.exe, rundll32.exe, etc.)

that is high-signal activity and warrants investigation. Even stronger signal appears when:

  • The child process makes an outbound network connection shortly after spawning.
  • Files are written to %AppData%, %Temp%, or %ProgramData%.
  • Scheduled tasks or registry Run keys are created within minutes of document execution.

MITRE ATT&CK Mapping

TacticTechnique
Initial AccessT1566.001 – Spearphishing Attachment
ExecutionT1204.002 – User Execution: Malicious File, T1059 – Scripting
Defense EvasionT1562 – Impair Defenses, T1218 – Signed Binary Proxy Execution
PersistenceT1547 – Boot/Logon Autostart, T1053 – Scheduled Task
Credential AccessT1003 – OS Credential Dumping
Lateral MovementT1021 – Remote Services

Why This Matters

Office documents remain one of the most trusted file types in business environments. When a vulnerability allows attackers to bypass internal protections silently, it reduces friction for initial compromise.

The increase in observed exploitation suggests defenders should treat CVE-2026-21509 as an active and evolving threat rather than a one-off incident. Office spawning scripting engines is not normal behavior; that telemetry is your early warning signal.

What You Should Do

  • Apply Microsoft’s latest Office security updates immediately.
  • Verify patch levels across all endpoints.
  • Monitor for suspicious Office child process behavior.
  • Restrict or audit PowerShell and LOLBin usage where possible.
  • Ensure EDR visibility into process creation and network connections.

Patching closes the vulnerability. Detection reduces dwell time if exploitation occurs.