{"id":42862,"date":"2021-09-15T23:40:56","date_gmt":"2021-09-15T23:40:56","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=97563"},"modified":"2021-09-15T23:40:56","modified_gmt":"2021-09-15T23:40:56","slug":"analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/","title":{"rendered":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability"},"content":{"rendered":"<p>In August, Microsoft Threat Intelligence Center (MSTIC) identified a small number of attacks (less than 10) that attempted to exploit a remote code execution vulnerability in MSHTML using specially crafted Microsoft Office documents. These attacks used the vulnerability, tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\">CVE-2021-40444<\/a>, as part of an initial access campaign that distributed custom Cobalt Strike Beacon loaders. These loaders communicated with an infrastructure that Microsoft associates with multiple cybercriminal campaigns, including human-operated ransomware.<\/p>\n<p>The observed attack vector relies on a malicious ActiveX control that could be loaded by the browser rendering engine using a malicious Office document. Customers who enabled <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction-rules?view=o365-worldwide\">attack surface reduction rules<\/a> to block Office from creating child processes are not impacted by the exploitation technique used in these attacks. While these attacks used a vulnerability to access entry point devices and run highly-privileged code, the secondary actions taken by the attackers still rely on stealing credentials and moving laterally to cause organization-wide impact. This illustrates the importance of investing in attack surface reduction, credential hygiene, and lateral movement mitigations. Customers are advised to apply the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\">security patch<\/a> for CVE-2021-40444 to fully mitigate this vulnerability.<\/p>\n<p>This blog details our in-depth analysis of the attacks that used the CVE-2021-40444, provides detection details and investigation guidance for <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\">Microsoft 365 Defender<\/a> customers, and lists mitigation steps for hardening networks against this and similar attacks. Our colleagues at <a href=\"https:\/\/www.riskiq.com\/blog\/external-threat-management\/wizard-spider-windows-0day-exploit\/\">RiskIQ conducted their own analysis<\/a> and coordinated with Microsoft in publishing this research.<\/p>\n<h2>Exploit delivery mechanism<\/h2>\n<p>The initial campaigns in August 2021 likely originated from emails impersonating contracts and legal agreements, where the documents themselves were hosted on file-sharing sites. The exploit document used an external oleObject relationship to embed exploitative JavaScript within MIME HTML remotely hosted content that results in (1) the download of a CAB file containing a DLL bearing an INF file extension, (2) decompression of that CAB file, and (3) execution of a function within that DLL. The DLL retrieves remotely hosted shellcode (in this instance, a custom Cobalt Strike Beacon loader) and loads it into <em>wabmig.exe<\/em> (Microsoft address import tool.)<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97578 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure1.png\" alt=\"Screenshot of code showing the original exploit vector\" width=\"624\" height=\"166\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure1.png 624w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure1-300x80.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\"><\/p>\n<p><em>Figure 1. The original exploit vector: an externally targeted oleObject relationship definition bearing an MHTML handler prefix pointed at an HTML file hosted on infrastructure that has similar qualities to the Cobalt Strike Beacon infrastructure that the loader\u2019s payload communicates with.<\/em><\/p>\n<p>Content that is downloaded from an external source is tagged by the Windows operating system with a mark of the web, indicating it was downloaded from a potentially untrusted source. This invokes Protected Mode in Microsoft Office, requiring user interaction to disable it to run content such as macros. However, in this instance, when opened without a mark of the web present, the document\u2019s payload executed immediately without user interaction \u2013 indicating the abuse of a vulnerability.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97581 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure2-attack-chain.png\" alt=\"diagram showing attack chain of DEV-0413 campaign that used CVE-2021-40444\" width=\"975\" height=\"433\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure2-attack-chain.png 975w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure2-attack-chain-300x133.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure2-attack-chain-768x341.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\"><\/p>\n<p><em>Figure 2. Attack chain of DEV-0413 campaign that used CVE-2021-40444<\/em><\/p>\n<h2>DEV-0413 observed exploiting CVE-2021-40444<\/h2>\n<p>As part of Microsoft\u2019s ongoing commitment to tracking both nation state and cybercriminal threat actors, we refer to the unidentified threat actor as a \u201cdevelopment group\u201d and utilize a threat actor naming structure with a prefix of \u201cDEV\u201d to indicate an emerging threat group or unique activity during the tracking and investigation phases before MSTIC reaches high confidence about the origin or identity of the actor behind an operation. MSTIC tracks a large cluster of cybercriminal activity involving Cobalt Strike infrastructure under the name DEV-0365.<\/p>\n<p>The infrastructure we associate with DEV-0365 has several overlaps in behavior and unique identifying characteristics of Cobalt Strike infrastructure that suggest it was created or managed by a distinct set of operators. However, the follow-on activity from this infrastructure indicates multiple threat actors or clusters associated with human-operated ransomware attacks (including the deployment of Conti ransomware). One explanation is that DEV-0365 is involved in a form of command- and-control infrastructure as a service for cybercriminals.<\/p>\n<p>Additionally, some of the infrastructure that hosted the oleObjects utilized in the August 2021 attacks abusing CVE-2021-40444 were also involved in the delivery of BazaLoader and Trickbot payloads \u2014 activity that overlaps with a group Microsoft tracks as DEV-0193. DEV-0193 activities overlap with actions tracked by Mandiant as UNC1878.<\/p>\n<p>Due to the uncertainty surrounding the nature of the shared qualities of DEV-0365 infrastructure and the significant variation in malicious activity, MSTIC clustered the initial email campaign exploitation identified as CVE-2021-40444 activity separately, under DEV-0413.<\/p>\n<p>The DEV-0413 campaign that used CVE-2021-40444 has been smaller and more targeted than other malware campaigns we have identified leveraging DEV-0365 infrastructure. We observed the earliest exploitation attempt of this campaign on August 18. The social engineering lure used in the campaign, initially highlighted by Mandiant, aligned with the business operations of targeted organizations, suggesting a degree of purposeful targeting. The campaign purported to seek a developer for a mobile application, with multiple application development organizations being targeted. In most instances, file-sharing services were abused to deliver the CVE-2021-40444-laden lure.<\/p>\n<p>It is worth highlighting that while monitoring the DEV-0413 campaign, Microsoft identified active DEV-0413 infrastructure hosting CVE-2021-40444 content wherein basic security principles had not been applied. DEV-0413 did not limit the browser agents able to access the server to their malware implant or known targets, thereby permitting directory listing for their web server. In doing so, the attackers exposed their exploit to anyone who might have gained interest based on public social media discussion.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97584 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure3-email-lure.png\" alt=\"Screenshot of content of email in DEV-0413 campaign that used CVE-2021-40444\" width=\"482\" height=\"555\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure3-email-lure.png 482w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure3-email-lure-261x300.png 261w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\"><\/p>\n<p><em>Figure 3. Content of the original DEV-0413 email lure seeking application developers<\/em><\/p>\n<p>At least one organization that was successfully compromised by DEV-0413 in their August campaign was previously compromised by a wave of similarly-themed malware that interacted with DEV-0365 infrastructure almost two months before the CVE-2021-40444 attack. It is currently not known whether the retargeting of this organization was intentional, but it reinforces the connection between DEV-0413 and DEV-0365 beyond sharing of infrastructure.<\/p>\n<p>In a later wave of DEV-0413 activity on September 1, Microsoft identified a lure change from targeting application developers to a \u201csmall claims court\u201d legal threat.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97617 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure4b-email-lure.png\" alt=\"Screenshot of another email lure used in the campaigns\" width=\"482\" height=\"533\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure4b-email-lure.png 482w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure4b-email-lure-271x300.png 271w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\"><\/p>\n<p><em>Figure 4. Example of the \u201cSmall claims court\u201d lure utilized by DEV-0413<\/em><em>&nbsp;<\/em><\/p>\n<h2>Vulnerability usage timeline<\/h2>\n<p>On August 21, 2021, MSTIC observed a social media post by a Mandiant employee with experience tracking Cobalt Strike Beacon infrastructure. This post highlighted a Microsoft Word document (SHA-256: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/3bddb2e1a85a9e06b9f9021ad301fdcde33e197225ae1676b8c6d0b416193ecf\">3bddb2e1a85a9e06b9f9021ad301fdcde33e197225ae1676b8c6d0b416193ecf<\/a>) that had been uploaded to VirusTotal on August 19, 2021. The post\u2019s focus on this document was highlighting the custom Cobalt Strike Beacon loader and did not focus on the delivery mechanism.<\/p>\n<p>MSTIC analyzed the sample and determined that an anomalous oleObject relationship in the document was targeted at an external malicious HTML resource with an MHTML handler and likely leading to abuse of an undisclosed vulnerability. MSTIC immediately engaged the Microsoft Security Response Center and work began on a mitigation and patch. During this process, MSTIC collaborated with the original finder at Mandiant to reduce the discussion of the issue publicly and avoid drawing threat actor attention to the issues until a patch was available. Mandiant partnered with MSTIC and did their own reverse engineering assessment and submitted their findings to MSRC.<\/p>\n<p>On September 7, 2021, Microsoft released a security advisory for CVE-2021-40444 containing a partial workaround. As a routine in these instances, Microsoft was working to ensure that the detections described in the advisory would be in place and a patch would be available before public disclosure. During the same time, a third-party researcher reported a sample to Microsoft from the same campaign originally shared by Mandiant. This sample was publicly disclosed on September 8. We observed a rise in exploitation attempts within 24 hours.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97590\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure5-Exploitation-attempts.png\" alt=\"Line graph showing volume of observed exploitation attempts\" width=\"600\" height=\"258\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure5-Exploitation-attempts.png 975w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure5-Exploitation-attempts-300x129.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Figure5-Exploitation-attempts-768x330.png 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\"><\/p>\n<p><em>Figure 5. Graphic showing original exploitation on August 18 and attempted exploitation increasing after public disclosure <\/em><\/p>\n<p>Microsoft continues to monitor the situation and work to deconflict testing from actual exploitation. Since the public disclosure, Microsoft has observed multiple threat actors, including ransomware-as-a-service affiliates, adopting publicly disclosed proof-of-concept code into their toolkits. We will continue to provide updates as we learn more.<\/p>\n<h2>Mitigating the attacks<\/h2>\n<p>Microsoft has confirmed that the following&nbsp;<a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/microsoft-defender-atp\/attack-surface-reduction\">attack surface reduction rule<\/a>&nbsp;blocks activity associated with exploitation of CVE-2021-40444 at the time of publishing:<\/p>\n<ul>\n<li>\u200bBlock all Office applications from creating child processes<\/li>\n<\/ul>\n<p>Apply the following mitigations to reduce the impact of this threat and follow-on actions taken by attackers.<\/p>\n<ul>\n<li>Apply the security updates for&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\">CVE-2021-40444<\/a>. Comprehensive updates addressing the vulnerabilities used in this campaign are available through the&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/\">September 2021 security updates<\/a>.<\/li>\n<li>Run the latest version of your operating systems and applications. Turn on automatic updates or deploy the latest security updates as soon as they become available.<\/li>\n<li>Use a supported platform, such as Windows 10, to take advantage of regular security updates.<\/li>\n<li>Turn on&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide\">cloud-delivered protection<\/a>in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block the majority of new and unknown variants.<\/li>\n<li>Turn on&nbsp;<a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/defender-endpoint\/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide\">tamper protection<\/a>in Microsoft Defender for Endpoint, to prevent malicious changes to security settings.<\/li>\n<li>Run&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/edr-in-block-mode?view=o365-worldwide\">EDR in block mode<\/a>so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus doesn\u2019t detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.<\/li>\n<li>Enable&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/automated-investigations?view=o365-worldwide\">investigation and remediation<\/a>in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.<\/li>\n<li>Use&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/device-discovery?view=o365-worldwide\">device discovery<\/a>to increase your visibility into your network by finding unmanaged devices on your network and onboarding them to Microsoft Defender for Endpoint.<\/li>\n<\/ul>\n<h2>Microsoft 365 Defender detection details<\/h2>\n<p><strong>Antivirus<\/strong><\/p>\n<p>Microsoft Defender Antivirus detects threat components as the following malware:<\/p>\n<p><strong>Endpoint detection and response (EDR)<\/strong><\/p>\n<p>Alerts with the following titles in the security center can indicate threat activity on your network:<\/p>\n<ul>\n<li>Possible exploitation of CVE-2021-40444 (requires Defender Antivirus as the Active AV)<\/li>\n<\/ul>\n<p>The following alerts might also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.<\/p>\n<ul>\n<li>Suspicious Behavior By Office Application (detects the anomalous process launches that happen in exploitation of this CVE, and other malicious behavior)<\/li>\n<li>Suspicious use of Control Panel item<\/li>\n<\/ul>\n<p><strong>Microsoft Defender for Office365<\/strong><\/p>\n<p>Signals from Microsoft Defender for Office 365 informs Microsoft 365 Defender, which correlates cross-domain threat intelligence to deliver coordinated defense, that this vulnerability has been detected when a document is delivered via email when detonation is enabled.<\/p>\n<p>The following alerts in your portal will indicate that a malicious attachment has been blocked, &nbsp;although these alerts are also used for many different threats:<\/p>\n<ul>\n<li>Malware campaign detected and blocked<\/li>\n<li>Malware campaign detected after delivery<\/li>\n<li>Email messages containing malicious file removed after delivery<\/li>\n<\/ul>\n<h2>Advanced hunting<\/h2>\n<p>To locate possible exploitation activity, run the following queries.<\/p>\n<p><strong>Relative path traversal (requires Microsoft 365 Defender)<\/strong><\/p>\n<p>Use the following query to surface abuse of Control Panel objects (.cpl) via URL protocol handler path traversal as used in the original attack and public proof of concepts at time of publishing:<\/p>\n<p><code>DeviceProcessEvents<br \/>| where (FileName in~('control.exe','rundll32.exe') and ProcessCommandLine has '.cpl:')<br \/>or ProcessCommandLine matches regex @'\\\".[a-zA-Z]{2,4}:\\.\\.\\\/\\.\\.'<\/code><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/15\/analyzing-attacks-that-exploit-the-mshtml-cve-2021-40444-vulnerability\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog details our in-depth analysis of the attacks that used the CVE-2021-40444, provides detection details and investigation guidance for Microsoft 365 Defender customers, and lists mitigation steps for hardening networks against this and similar attacks.<br \/>\nThe post Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42863,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[9625,347,7221,9237,9626,1710],"class_list":["post-42862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cve-2021-40444","tag-cybersecurity","tag-microsoft-security-intelligence","tag-microsoft-threat-intelligence-center-mstic","tag-mshtml","tag-zero-day-exploit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T23:40:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"166\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability\",\"datePublished\":\"2021-09-15T23:40:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\"},\"wordCount\":1836,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png\",\"keywords\":[\"CVE-2021-40444\",\"Cybersecurity\",\"Microsoft security intelligence\",\"Microsoft Threat Intelligence Center (MSTIC)\",\"MSHTML\",\"zero-day exploit\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\",\"name\":\"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png\",\"datePublished\":\"2021-09-15T23:40:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png\",\"width\":624,\"height\":166},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2021-40444\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cve-2021-40444\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-09-15T23:40:56+00:00","og_image":[{"width":624,"height":166,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability","datePublished":"2021-09-15T23:40:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/"},"wordCount":1836,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png","keywords":["CVE-2021-40444","Cybersecurity","Microsoft security intelligence","Microsoft Threat Intelligence Center (MSTIC)","MSHTML","zero-day exploit"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/","name":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png","datePublished":"2021-09-15T23:40:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability.png","width":624,"height":166},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/analyzing-attacks-that-exploit-the-cve-2021-40444-mshtml-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2021-40444","item":"https:\/\/www.threatshub.org\/blog\/tag\/cve-2021-40444\/"},{"@type":"ListItem","position":3,"name":"Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42862"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42863"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}