Back to News
Cybersecurity

APT28 Exploits MSHTML 0-Day CVE-2026-21513 Prior to Patch Release

New findings reveal that the APT28 group exploited a critical MSHTML vulnerability before Microsoft's patch was released.

Recent research by Akamai has uncovered that the high-severity vulnerability CVE-2026-21513, which affects the MSHTML Framework and carries a CVSS score of 8.8, may have been targeted by the state-sponsored threat actor APT28, linked to Russia. The flaw represents a significant security feature bypass, allowing unauthorized access to systems, which raises serious concerns regarding its exploitation prior to Microsoft's scheduled Patch Tuesday update in February 2026.

For businesses, this finding underscores the urgent need for proactive cybersecurity measures, especially in the context of zero-day vulnerabilities that can be exploited by advanced persistent threats. Organizations should prioritize the implementation of robust security protocols, regular software updates, and employee training to mitigate the risks associated with such vulnerabilities. The implications are particularly critical in sectors that may serve as targets for state-sponsored attacks, as the exploitation of these vulnerabilities can lead to significant operational disruptions and reputational damage. Understanding the tactics used by threat actors like APT28 is essential for developing effective defense strategies in the evolving landscape of cybersecurity and AI.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html)*