Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows

By
Follow google news

No interaction needed.

Microsoft's partial patching in February 2026 of a zero-day vulnerability abused by Russian state-sponsored threat group Fancy Bear created a new flaw that is now being exploited without user interaction, Akamai said.

Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows

The vulnerability is a zero-click coercion bug, indexed as CVE-2026-32202, and uses a .lnk shortcut file that causes the victim machine to authenticate involuntarily to the attacker's server.

Microsoft has acknowledged the flaw is being exploited in its updated advisory, saying it is a Windows Shell spoofing vulnerability.

Akamai researcher Maor Dahan said the exploit was detected in January this year.

Microsoft originally patched the vulnerability, CVE-2026-21510, in its February round of security updates, but that fix was incomplete.

Dahan said the February patch handled the initial remote code execution (RCE) and Windows SmartScreen bypass, but as the operating system Explorer file manager renders the contents of a folder that contains the malicious .lnk file, a targeted computer will initiate a Server Message Block (SMB) protocol connection to an attacker's server, without user interaction.

That connection then triggers an automatic authentication handshake that sends the victim machine's NTLMv2 hash to the attacker; this can later be used for NTLM relay attacks and be cracked offline.

On top of applying Microsoft's patch for CVE-2026-32202, administrators are also advised to block outgoing traffic on TCP ports 139 and 445 to prevent attacks.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Attacker embeds Claude Code in mass credential harvesting op

Attacker embeds Claude Code in mass credential harvesting op

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Log In

  |  Forgot your password?