The Russian state-sponsored threat group APT28 (also known as Fancy Bear, Forest Blizzard) has been attributed to an active campaign exploiting CVE-2026-32202, a zero-click credential harvesting vulnerability in the Microsoft Windows Shell. The attack is elegant and requires minimal user interaction: a victim receives a malicious .LNK file via email, and the vulnerability is triggered simply by viewing the file in Windows Explorer. This forces the victim's computer to connect to an APT28-controlled server, leaking the user's NTLM authentication hash for offline cracking. The campaign is targeting government and defense entities in Europe, Ukraine, and NATO member states. CISA has added the flaw to its KEV catalog with a May 12 patching deadline, but the threat to unpatched systems remains acute.
This campaign is a classic example of credential access focused on espionage. APT28's goal is to obtain valid credentials that can be used for initial access or lateral movement within target networks. The use of a zero-click exploit is particularly dangerous as it bypasses the need to trick a user into clicking a link or opening a document. The exploit leverages a flaw in how Windows Shell processes .LNK files, turning a normally benign action (opening a folder) into a security compromise. The stolen NTLM hashes are then subjected to offline brute-force attacks to recover the plaintext password.
The attack chain leverages several TTPs:
.LNK file is delivered via email, making this a form of spearphishing (T1566 - Phishing)..LNK file is rendered by Windows Explorer, without a direct click from the user. This is a form of T1204 - User Execution.T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting (conceptually similar, though technically NTLM). The subsequent cracking of the hash is part of T1110.002 - Brute Force: Password Cracking.T1071.002 - Application Layer Protocol: File Transfer Protocols).The immediate impact of this attack is the loss of user credentials. If APT28 successfully cracks the NTLM hash, they gain a valid username and password. This credential can then be used to access email (OWA), VPNs, or other corporate resources. For the targeted government and defense organizations, this could lead to the compromise of sensitive, classified, or diplomatic information. A successful credential theft is often the first step in a much larger intrusion campaign aimed at long-term espionage.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams can hunt for this activity using the following observables:
file_name*.lnk.LNK files arriving as email attachments or being downloaded from the web. This is an increasingly common vector.network_traffic_patternlog_sourceprocess_nameexplorer.exe making outbound network connections.explorer.exe making suspicious outbound network connections. D3FEND's D3-OTF - Outbound Traffic Filtering is the key defensive technique..LNK file and perform a broader search for it across the environment.M1051 - Update Software). Configure email gateways to block or quarantine emails containing .LNK files as attachments. Enforce strong password policies to make offline cracking of stolen NTLM hashes more difficult and time-consuming (M1027 - Password Policies).New details reveal CVE-2026-32202 stems from an incomplete Microsoft patch for a prior zero-day, CVE-2026-21510, allowing APT28 to exploit it for 10 additional weeks.
Blocking outbound SMB (TCP/445) traffic at the perimeter firewall is the most effective mitigation against this NTLM coercion technique.
Applying the Microsoft patch for CVE-2026-32202 fixes the underlying vulnerability in the Windows Shell.
Enforcing strong, complex passwords makes it significantly harder for APT28 to crack the stolen NTLM hashes offline.
Configuring email gateways to block attachments with .LNK file extensions can prevent the initial delivery of the exploit.
The single most effective defense against the CVE-2026-32202 exploit campaign is to implement strict Outbound Traffic Filtering at the network perimeter. Specifically, organizations must block all outbound SMB traffic on TCP port 445 and UDP ports 137/138 from their internal networks to the internet. There are virtually no legitimate business reasons for client workstations to initiate SMB connections to external servers. By implementing this simple firewall rule, the attack chain is broken. Even if a user receives the malicious .LNK file and the exploit triggers, the victim's machine will be unable to connect to APT28's remote server, and the NTLM hash will not be leaked. This is a foundational security control that mitigates a wide range of credential theft and lateral movement techniques.
While blocking outbound SMB is the best network-level defense, patching the underlying vulnerability is the correct host-level remediation. Organizations must prioritize the deployment of Microsoft's security update for CVE-2026-32202. Given that it is on the CISA KEV list, this should be treated as an emergency patch. Using a centralized patch management system, administrators should push this update to all Windows workstations and servers immediately. This removes the vulnerability from the Windows Shell, ensuring that even if a malicious .LNK file is encountered, the exploit cannot be triggered. This is the definitive fix that removes the risk, whereas network controls only mitigate it.
APT28 is definitively linked to the active exploitation of CVE-2026-32202.
CISA's deadline for federal agencies to patch or mitigate the vulnerability.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.