Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users

2 months ago 31
MicrosoftImage Credits:Deb Cohn-Orbach / UCG / Universal Images Group / Getty Images

12:46 PM PST · February 11, 2026

Microsoft has rolled retired fixes for information vulnerabilities successful Windows and Office, which the institution says are being actively abused by hackers to interruption into people’s computers.

The exploits are one-click attacks, meaning that a hacker tin works malware oregon summation entree to a victim’s machine with minimal idiosyncratic interaction. At slightest 2 flaws tin beryllium exploited by tricking idiosyncratic into clicking a malicious nexus connected their Windows computer. Another tin effect successful a compromise connected opening a malicious Office file.

The vulnerabilities are known arsenic zero-days, due to the fact that the hackers were exploiting the bugs earlier Microsoft had clip to hole them.

Details of however to exploit the bugs person been published, Microsoft said, perchance expanding the accidental of hacks. Microsoft did not accidental wherever they had been published, and a Microsoft spokesperson did not instantly remark erstwhile reached by TechCrunch. In its bug reports, Microsoft acknowledged the input of information researchers successful Google’s Threat Intelligence Group successful their find of the vulnerabilities. 

Microsoft said 1 of the bugs, officially tracked arsenic CVE-2026-21510, was recovered successful the Windows shell, which powers the operating system’s idiosyncratic interface. The bug affects each supported versions of Windows, the institution said. When a unfortunate clicks connected a malicious nexus from their computer, the bug allows hackers to bypass Microsoft’s SmartScreen diagnostic that would typically surface malicious links and files for malware.

According to security adept Dustin Childs, this bug tin beryllium abused to remotely works malware connected the victim’s computer.

“There is idiosyncratic enactment here, arsenic the lawsuit needs to click a nexus oregon a shortcut file,” Childs wrote successful a blog post. “Still, a one-click bug to summation codification execution is simply a rarity.”

A Google spokesperson confirmed that the Windows ammunition bug was nether “widespread, progressive exploitation,” and said palmy hacks allowed the soundless execution of malware with precocious privileges, “posing a precocious hazard of consequent strategy compromise, deployment of ransomware, oregon quality collection.”

Another Windows bug, tracked arsenic CVE-2026-21513, was recovered successful Microsoft’s proprietary browser engine, MSHTML, which powers its bequest and long-discontinued Internet Explorer browser. It’s inactive recovered successful newer versions of Windows to guarantee backwards compatibility with older apps. 

Microsoft said this bug allows hackers to bypass information features successful Windows to works malware.

According to autarkic information newsman Brian Krebs, Microsoft besides patched three different zero-day bugs successful its bundle that were being actively exploited by hackers.

Zack Whittaker is the information exertion astatine TechCrunch. He besides authors the play cybersecurity newsletter, this week successful security.

He tin beryllium reached via encrypted connection astatine zackwhittaker.1337 connected Signal. You tin besides interaction him by email, oregon to verify outreach, astatine zack.whittaker@techcrunch.com.

Read Entire Article