Current Cyber Threats

Russia-linked APT28 Exploited MSHTML Zero-day CVE-2026-21513 Before Patch

Summary:
Microsoft patched CVE-2026-21513 during February 2026's Patch Tuesday, a security features bypass vulnerability within the MSHTML framework carrying a CVSS score of 8.8. The flaw is an Internet Explorer security control bypass that can lead to code execution when a victim opens a malicious HTML page or LNK file.

Akamai researchers used their PatchDiff-AI tool to trace the root cause to hyperlink navigation logic within ieframe[.]dll. Insufficient URL validation allows attacker-controlled input to reach ShellExecuteExW, enabling execution of local or remote resources outside the intended browser security context.

The in-the-wild exploit, identified as document[.]doc[.]LnK[.]download, was first submitted to VirusTotal on January 30, 2026, shortly before Patch Tuesday, and is associated with infrastructure linked to APT28, a Russian state-sponsored threat actor. Microsoft confirmed the CVE was exploited in real-world zero-day attacks.

Security Officer Comments:
The exploit mechanism works by delivering a specially crafted Windows Shortcut (.lnk) with an embedded HTML file. It leverages nested iframes and multiple DOM contexts to manipulate trust boundaries, bypassing both Mark of the Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC), effectively downgrading the security context before triggering the vulnerable navigation flow. This ultimately allows attacker-controlled content to invoke ShellExecuteExW and execute code outside the browser sandbox. The LNK file beacons to wellnesscaremed[.]com, a domain attributed to APT28's multistage campaign infrastructure.

All Windows versions are affected, and the vulnerability is actively exploited in the wild. Successful exploitation results in sandbox escape and arbitrary code execution on the victim host, with no meaningful user warning presented prior to exploitation.

The primary distribution used in this campaign was spearphishing via malicious LNK files, though the vulnerable code path can be triggered through any component embedding MSHTML, so additional delivery mechanisms beyond LNK-based phishing should be expected.

Suggested Corrections:
Organizations should apply Microsoft's February 2026 security updates immediately, this fully mitigates the vulnerability. Additionally, organizations should block or alert on the IOC domain wellnesscaremed[.]com at DNS/proxy layers and hunt for the file hash aefd15e3c395edd16ede7685c6e97ca0350a702ee7c8585274b457166e86b1fa (document[.]doc[.]LnK).

For long-term mitigation, organizations should enable and enforce attack surface reduction (ASR) rules to block LNK-based execution paths, audit exposure of MSHTML-embedding applications (Office, legacy IE components, third-party apps) across the environment, and reinforce user awareness around LNK/shortcut files delivered via email or file shares.

Link(s):
https://www.akamai.com/blog/securit...he-fix-cve-2026-21513-mshtml-exploit-analysis