CVE-2026-21509 APT28 Office Exploitation Detection Rules#5870
Open
jaamaal wants to merge 1 commit intoSigmaHQ:masterfrom
Open
CVE-2026-21509 APT28 Office Exploitation Detection Rules#5870jaamaal wants to merge 1 commit intoSigmaHQ:masterfrom
jaamaal wants to merge 1 commit intoSigmaHQ:masterfrom
Conversation
- 6 comprehensive detection rules for Operation Neusploit
- Covers RTF exploitation through C2 communication
- Detects MiniDoor, PixyNetLoader, and Covenant Grunt
Closed
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds 6 comprehensive Sigma detection rules for CVE-2026-21509, a Microsoft Office security feature bypass vulnerability actively exploited by APT28 (Fancy Bear / UAC-0001) in Operation Neusploit.
These rules are categorized as emerging threats due to:
CVE Details:
Detection Coverage:
Changelog
new: CVE-2026-21509 - Malicious RTF File Access and WebDAV Connection
new: CVE-2026-21509 - MiniDoor Email Stealer VBA Project Deployment
new: CVE-2026-21509 Microsoft Office Zero-Day Exploitation - APT28 Operation Neusploit
new: CVE-2026-21509 - Covenant Grunt Implant Indicators
new: CVE-2026-21509 - Network Connection to Malicious Infrastructure
new: CVE-2026-21509 - PixyNetLoader Deployment and COM Hijacking
Example Log Event
Malicious RTF Access (Sysmon Event ID 11):
11 C:\Users\victim\Downloads\BULLETEN_military_training.rtf C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEOffice WebDAV Exploitation (Sysmon Event ID 1):
1 C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE C:\Windows\System32\rundll32.exe rundll32.exe davclnt.dll,DavSetCookie \\@SSL\185.220.101.1\webdav\Network C2 Connection (Sysmon Event ID 3):
3 C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE api.filen.io 443Fixed Issues
N/A - New emerging threat rule submission
SigmaHQ Rule Creation Conventions
Emerging Threats Directory Structure:
rules-emerging-threats/2026/Exploits/CVE-2026-21509/Rule Quality Standards:
experimental(correct for newly disclosed CVE)Testing:
Documentation:
Additional Context:
These rules complement each other to provide full attack chain coverage:
All rules are based on public threat intelligence and do not contain any classified or restricted information.
References: