APT28 Exploits Windows Shell Flaw to Steal NTLMv2 Hashes in Zero-Click Attacks
Russian nation-state group APT28 is actively stealing Windows credentials from unpatched systems today — without requiring victims to click anything. CVE-2026-32202, a protection mechanism failure in Windows Shell, enables a zero-click NTLMv2 hash theft attack that triggers the moment a victim browses a folder containing a malicious Windows Shortcut file. Microsoft revised its CVE-2026-32202 advisory on April 27, 2026 to confirm active exploitation in the wild after initially publishing the flaw on April 14 with incorrect severity data. The patch exists in the April 2026 Patch Tuesday update. Organizations that have not applied it are exposed right now.
The official CVSS score of 4.3 significantly understates the operational risk. This is not a theoretical spoofing flaw. APT28 — also tracked as Fancy Bear, Forest Blizzard, GruesomeLarch, and Pawn Storm — has weaponized the underlying vulnerability chain since December 2025, targeting Ukrainian government organizations and EU member states. The attack delivers a malicious LNK file that Windows Explorer automatically processes for thumbnail rendering, triggering an outbound SMB connection to an attacker-controlled server that captures the victim's NTLMv2 authentication hash. That hash can then be relayed in real time to corporate Exchange servers, SharePoint instances, or domain controllers — or cracked offline to recover plaintext credentials.
What makes CVE-2026-32202 particularly dangerous is its origins: it is the residual attack surface from an incomplete patch. When Microsoft fixed CVE-2026-21510 (CVSS 8.8) in February 2026 — APT28's original remote code execution zero-day — the fix addressed the RCE component but left the authentication coercion mechanism intact. Akamai Security Research identified the gap and disclosed CVE-2026-32202 as a direct bypass of that fix. Understanding the chain is essential: organizations that patched CVE-2026-21510 in February but have not yet applied the April 2026 update remain fully exposed to zero-click NTLMv2 credential theft.
How CVE-2026-32202 enables zero-click NTLMv2 hash theft via malicious LNK files
The attack mechanism behind CVE-2026-32202 exploits a fundamental behavior of the Windows Shell: when a user opens a folder in Windows Explorer, the Shell automatically processes shortcut (.lnk) files present in that folder to render their thumbnail icons. This processing occurs without any user action beyond navigating to the directory.
APT28 crafts malicious LNK files containing a UNC path — a network address in the format \\attacker-server\share\icon.ico — as the icon source. When Windows Explorer attempts to load this icon, shell32.dll initiates an outbound Server Message Block (SMB) connection on TCP port 445 to the attacker-controlled server. SMB connections inherently trigger NTLM authentication negotiation, during which Windows automatically sends the victim's NTLMv2 hash to the remote server — including the username, domain, and cryptographic material derived from the user's password — without any prompt or visible indication to the user.
The attacker's server captures this NTLMv2 hash in real time. From that point, two attack paths open. First, NTLM relay: the attacker relays the authentication attempt immediately to a target server (Exchange, SharePoint, domain controller), impersonating the victim without ever cracking the password. Second, offline cracking: the captured NTLMv2 hash can be submitted to GPU-accelerated cracking tools. Common passwords fall in minutes; even complex passwords can yield to sustained cracking efforts.
The zero-click nature stems from the Shell's automatic icon rendering behavior. Delivery mechanisms are broad: the malicious LNK file can arrive via phishing email attachment, USB drive, or placement on a network share that legitimate users are likely to browse. The [CVE-2023-23397 Outlook NTLM hash theft](/blog/cve-2023-23397-outlook-ntlm-explained) attack documented in 2023 used a similar NTLM coercion technique via calendar invites — CVE-2026-32202 represents APT28 returning to the same fundamental technique via a different delivery vector.
Delivery — Malicious LNK File Placed in Target Location
APT28 delivers a crafted Windows Shortcut (.lnk) file via phishing email, network share, or USB drive. The file contains an attacker-controlled UNC path (\\attacker-ip\share\icon) as its icon source — no execution required.
Trigger — Windows Explorer Auto-Renders Folder Contents
When the victim opens the folder containing the LNK file in Windows Explorer, shell32.dll automatically processes the shortcut for thumbnail rendering. No file opening or execution is required from the user — folder navigation is the trigger.
SMB Connection — Zero-Click Outbound Auth to Attacker Server
Windows initiates an SMB connection (TCP 445) to the UNC path in the LNK file. The NTLM authentication handshake begins automatically, transmitting the victim's NTLMv2 hash — username, domain, and password-derived cryptographic material — to the attacker's server.
Credential Capture — NTLMv2 Hash Received by APT28 Infrastructure
The attacker's server captures the NTLMv2 authentication material. The victim receives no prompt and sees no error. The entire sequence from folder navigation to hash capture completes in under one second.
Post-Exploitation — NTLM Relay or Offline Password Cracking
APT28 either relays the hash immediately to Exchange, SharePoint, or a domain controller to authenticate as the victim (NTLM relay), or submits the hash to offline GPU-accelerated cracking tools to recover the plaintext password for persistent access.
The incomplete patch chain: from APT28's CVE-2026-21510 zero-day to CVE-2026-32202
CVE-2026-32202 is not a standalone discovery — it is the direct consequence of a February 2026 patch that fixed the most visible part of a two-component vulnerability while leaving the authentication coercion mechanism intact.
APT28 originally weaponized a zero-day tracked as CVE-2026-21510 (CVSS 8.8) — a protection mechanism failure in Windows Shell that enabled full remote code execution when a victim opened a specially crafted folder. The group deployed this zero-day in a campaign targeting Ukrainian government entities and EU nations beginning in December 2025, chaining it with CVE-2026-21513 (CVSS 8.8), a similar MSHTML Framework protection failure, to maximize the attack surface. Microsoft patched both vulnerabilities in February 2026 Patch Tuesday.
Akamai Security Research subsequently analyzed the February 2026 fix and identified that while the RCE vector was closed, the underlying UNC path processing behavior that Windows Explorer performs during thumbnail rendering was not fully constrained. Specifically, the patch did not prevent shell32.dll from initiating outbound SMB connections to attacker-controlled UNC paths embedded in LNK files. This authentication coercion path — the mechanism APT28 had been using for NTLMv2 credential theft even prior to the RCE capability — survived the fix intact.
Akamai disclosed this bypass as CVE-2026-32202, which Microsoft initially published on April 14 with a CVSS score of 4.3 reflecting only the confidentiality-limited scope of NTLMv2 hash exposure. Microsoft revised the advisory on April 27 to confirm active exploitation and acknowledge the APT28 attribution, completing the timeline from APT28's original zero-day to the residual credential theft capability that organizations must now patch with the April 2026 update. Organizations that applied the February 2026 fix for CVE-2026-21510 but have not yet deployed [this month's Patch Tuesday updates](/blog/patch-tuesday-april-2026) remain exposed.
Affected Windows versions: who needs the April 2026 patch now
CVE-2026-32202 affects a wide range of Windows desktop and server releases. The NVD advisory identifies 14 or more distinct version-build combinations as vulnerable, spanning the consumer and enterprise install base. Any system that has not applied the April 2026 Patch Tuesday cumulative update is exposed.
Affected desktop versions include Windows 10 versions 1607, 1809, 21H2, and 22H2, and Windows 11 versions 23H2, 24H2, 25H2, and 26H1. On the server side, Windows Server 2012 R2 and subsequent server releases are affected. Each version has a specific build number cutoff — for example, Windows 10 version 1607 builds up to and including 10.0.14393.9060 are vulnerable; the April 2026 cumulative update provides the remediated build.
This breadth matters for enterprise patch management: organizations running mixed Windows 10 and Windows 11 estates, or maintaining legacy Windows Server 2012 R2 infrastructure that has not yet been migrated, must validate patch status across all version tracks. Windows Update will serve the correct cumulative update for each version automatically, but organizations using WSUS, SCCM, or third-party patch management tools must verify that April 2026 cumulative updates have been distributed and installed — not merely approved.
The attack requires no privileged access and no exploit kit. The only requirement is that the attacker can place a file in a location that the victim will navigate to in Windows Explorer. Network shares, email attachments, and removable media all provide viable delivery paths. Remote workers accessing corporate file shares are a particularly exposed population if SMB is not blocked at the network perimeter.
“While Microsoft fixed the initial RCE (CVE-2026-21510), the authentication coercion flaw remained, leaving a zero-click credential theft vector via auto-parsed LNK files. The gap between path resolution and trust verification in Windows Shell is what CVE-2026-32202 exploits.”
— Akamai Security Research — A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202, April 2026
APT28 targeting: Ukraine, EU governments, and sustained NTLM credential operations
APT28 — formally attributed to Russia's GRU military intelligence directorate — has maintained NTLM-based credential theft as a core operational technique across multiple campaigns and CVEs. The group's December 2025 campaign exploiting CVE-2026-21510 and CVE-2026-21513 targeted Ukrainian government organizations and EU member state institutions, consistent with APT28's documented focus on intelligence collection from NATO-aligned and post-Soviet governments.
NTLM credential theft is strategically valuable for APT28 because it bypasses the challenge of password guessing entirely. A captured NTLMv2 hash from a high-value account — a government minister's email account, a defense contractor's Active Directory credentials — provides immediate, authenticated access to internal systems via NTLM relay before any password cracking is necessary. APT28 has a documented history of targeting Microsoft Exchange servers specifically for email access through NTLM relay, consistent with an intelligence collection mission prioritizing diplomatic and defense communications.
The Russia-Ukraine conflict context gives the December 2025 – April 2026 campaign timeline operational significance. APT28's sustained focus on credential theft infrastructure suggests ongoing collection operations against European government targets that predate and will outlast any individual CVE. Organizations supporting Ukraine aid operations, EU policy development, or NATO planning functions should treat CVE-2026-32202 as an active, targeted threat — not a background noise vulnerability that can wait for the next patching cycle.
CVE-2026-32202 IOCs: detecting zero-click LNK exploitation in your environment
Detection of CVE-2026-32202 exploitation requires network-layer and endpoint telemetry. The key behavioral signal is outbound SMB traffic from Windows Shell processes to external IP addresses — a pattern that should never occur in a correctly configured enterprise environment.
At the network layer, monitor for TCP port 445 connections originating from Windows workstations to external IP addresses not in your organization's known-good IP ranges. This traffic will appear to originate from the Windows Explorer process or from smss.exe / shell32.dll in process-level network monitoring. An NDR or NGFW that logs connection-level metadata will capture this. FortiGuard has published IPS signature MS.Windows.CVE-2026-32202.Shell.Spoofing for automated network-layer detection.
At the endpoint, focus on Windows Event Log telemetry. Event ID 4624 (Successful Logon) with Logon Type 3 (Network) and Authentication Package NTLM, where the Workstation Name does not match expected internal servers, indicates a successful NTLMv2 authentication to an unexpected destination. Event ID 4625 (Failed Logon) with the same parameters indicates an attempted relay that failed. Enable Security audit policy for Logon Events on all workstations — not just domain controllers — to capture this telemetry at the source.
In email security gateways, flag and quarantine inbound messages containing .lnk file attachments or archive files containing .lnk files — LNK files are rarely legitimate email attachments and are a consistent APT28 delivery mechanism.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| Outbound TCP 445 from explorer.exe to external IP | Network Behavior | Primary detection signal — Windows Explorer initiating SMB to external addresses indicates LNK-triggered UNC coercion |
| Windows Event ID 4624 — Logon Type 3, Auth Package NTLM, unexpected Workstation | Event Log | Successful NTLMv2 authentication to non-corporate server — potential relay or hash capture confirmation |
| Windows Event ID 4625 — Logon Type 3, Auth Package NTLM, unexpected target | Event Log | Failed NTLM authentication attempt — potential relay in progress or attacker server probing |
| .lnk file with UNC path icon source (non-local path) | File Artifact | Malicious LNK files embed \\attacker-IP\share\icon as icon path — detectable via file inspection or LNK parser tools |
| MS.Windows.CVE-2026-32202.Shell.Spoofing | IPS Signature | FortiGuard IPS signature for network-layer CVE-2026-32202 detection — available in FortiGuard Encyclopedia ID 60620 |
| Unusual SMB authentication to non-domain-joined servers from desktop workstations | Behavioral | NTLM relay indicator — desktop initiating authenticated SMB to servers outside standard domain infrastructure |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
How to remediate CVE-2026-32202: patching, SMB blocking, and NTLM controls
Remediation of CVE-2026-32202 has a single definitive step — apply the April 2026 Patch Tuesday cumulative update — but defense-in-depth controls should be implemented in parallel to reduce exposure across any systems where patching is delayed.
Apply the April 2026 Patch Tuesday update immediately
The April 2026 cumulative update patches CVE-2026-32202 for all affected Windows versions. Prioritize internet-facing systems, VDI environments, and systems accessed by privileged accounts. Validate patch status via Windows Update, WSUS, or your patch management console — confirm that the April 2026 cumulative build number is installed on all affected version tracks. This is the only definitive remediation.
Block outbound SMB (TCP 445) at the network perimeter
Configure perimeter firewalls to block outbound TCP port 445 from internal workstations to any external destination. This prevents NTLMv2 hashes from reaching attacker-controlled servers even if a malicious LNK file is opened on an unpatched system. Most enterprise environments have no legitimate reason for workstations to initiate outbound SMB to the internet. This control also mitigates a broad class of UNC-path coercion and SMB-based credential theft attacks beyond CVE-2026-32202.
Enable Extended Protection for Authentication (EPA) on all Microsoft services
EPA binds NTLM authentication tokens to the TLS channel, preventing relay attacks even when an NTLMv2 hash is captured. Enable EPA on Exchange Server, SharePoint, IIS, and any other internal services that accept NTLM authentication. Microsoft provides EPA configuration guidance for each service; enabling it does not require patching and provides immediate relay-blocking protection independent of the CVE-2026-32202 patch.
Restrict NTLM via Group Policy — enforce Kerberos where possible
Configure Network Security: Restrict NTLM via Group Policy to audit and then block NTLM authentication to remote servers. Use the 'Deny all' setting for outbound NTLM to external domains. For internal services, require Kerberos authentication and restrict NTLM to a defined allowlist of internal servers. Kerberos-only environments are structurally immune to NTLMv2 hash theft and relay attacks.
Block .lnk file attachments in email and endpoint controls
Configure email security gateways to quarantine messages containing .lnk files or archives (ZIP, RAR) with .lnk content. Windows Attachment Manager Group Policy can be set to prevent execution of .lnk files downloaded from the internet or received via email (Mark of the Web enforcement). APT28 consistently uses LNK files as initial access vectors — blocking this file type at the email perimeter eliminates the primary CVE-2026-32202 delivery mechanism.
The bottom line
CVE-2026-32202 Windows Shell spoofing gives APT28 a zero-click path to NTLMv2 credential theft from every unpatched Windows 10, Windows 11, and Windows Server system — and active exploitation was confirmed yesterday. Apply the April 2026 Patch Tuesday update to all Windows endpoints today, block outbound SMB at the perimeter now, and enable Extended Protection for Authentication on all Microsoft services this week. The patch exists; the only variable is whether your systems receive it before APT28's LNK files do.
Frequently asked questions
What is CVE-2026-32202?
CVE-2026-32202 is a protection mechanism failure in Windows Shell (CWE-693) that allows an unauthenticated remote attacker to perform spoofing over a network — specifically, to coerce a victim's Windows system into sending its NTLMv2 authentication hash to an attacker-controlled server without any user interaction. Microsoft assigned a CVSS score of 4.3, but active exploitation by APT28 in targeted credential theft campaigns elevates the operational risk significantly above that score. The vulnerability was patched in the April 2026 Patch Tuesday update.
Is CVE-2026-32202 a zero-click vulnerability?
Yes. CVE-2026-32202 is effectively zero-click in practice. An attacker delivers a malicious Windows Shortcut (LNK) file to a victim — via email, USB, or a network share. When the victim browses the folder containing the LNK file using Windows Explorer, the Shell automatically attempts to load a thumbnail icon from a UNC path embedded in the file. This triggers an outbound SMB connection to the attacker's server, which captures the NTLMv2 hash — all without the victim ever opening or executing the file.
What is the relationship between CVE-2026-32202 and CVE-2026-21510?
CVE-2026-21510 (CVSS 8.8) was the original APT28-weaponized Windows Shell vulnerability patched in February 2026. Microsoft's fix addressed the remote code execution component but left an authentication coercion flaw intact — the gap between path resolution and trust verification when Windows Shell processes UNC paths in LNK files. CVE-2026-32202 is that residual gap: an incomplete patch that re-exposed the zero-click NTLMv2 credential theft vector that APT28 had already operationalized. Akamai Security Research disclosed this patch gap.
How does APT28 use stolen NTLMv2 hashes?
APT28 (Fancy Bear, Forest Blizzard, GruesomeLarch) uses NTLMv2 hashes in two primary ways. First, NTLM relay attacks: the hash is relayed in real time to a secondary server — an Exchange server, SharePoint site, or domain controller — authenticating as the victim without ever cracking the hash. Second, offline cracking: NTLMv2 hashes can be brute-forced using GPU clusters; common passwords crack in minutes. APT28 has used both techniques in campaigns targeting Ukraine and EU government entities documented since December 2025.
Which Windows versions are affected by CVE-2026-32202?
CVE-2026-32202 affects a broad range of Windows versions: Windows 10 (versions 1607, 1809, 21H2, and 22H2), Windows 11 (versions 23H2, 24H2, 25H2, and 26H1), and Windows Server 2012 R2 and later server releases. Each affected version has a specific build cutoff; systems running the April 2026 Patch Tuesday update are patched. The NVD advisory lists 14 or more distinct affected version-build combinations.
How do I detect CVE-2026-32202 exploitation attempts?
Detection focuses on network and endpoint telemetry. Monitor for outbound SMB (TCP 445) connections originating from explorer.exe or shell32.dll to external IP addresses — this pattern is highly anomalous and indicates LNK-triggered UNC path coercion. Enable network capture or NDR tools to inspect NTLMv2 authentication attempts targeting attacker-controlled servers. Windows Event ID 4624 with NTLM authentication from the victim system to an unexpected external server is a key indicator. FortiGuard has published IPS signature MS.Windows.CVE-2026-32202.Shell.Spoofing for network-layer detection.
Does the April 2026 Patch Tuesday fix CVE-2026-32202?
Yes. Microsoft addressed CVE-2026-32202 as part of the April 2026 Patch Tuesday release. Organizations should apply the April 2026 cumulative update to all affected Windows 10, Windows 11, and Windows Server systems immediately. This patch closes the authentication coercion gap left by the February 2026 fix for CVE-2026-21510. Patching is the definitive remediation; supplementary controls (blocking outbound SMB, enforcing Kerberos) provide defense-in-depth while patching is underway.
How can I protect Windows systems against NTLMv2 hash coercion attacks?
Layered controls include: (1) Apply the April 2026 Patch Tuesday update immediately — this directly patches CVE-2026-32202. (2) Block outbound SMB (TCP 445) at the network perimeter — this prevents hash exfiltration even if an unpatched system loads the malicious LNK file. (3) Enable Windows Defender Credential Guard to protect credential material in memory. (4) Configure Group Policy to enforce Kerberos authentication and restrict NTLM to known servers (Network Security: Restrict NTLM settings). (5) Deploy Extended Protection for Authentication (EPA) on all Microsoft services.
Sources & references
- The Hacker News — Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
- Akamai Security Research — A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
- SecurityWeek — Incomplete Windows Patch Opens Door to Zero-Click Attacks
- NVD — CVE-2026-32202 Detail
- Cypro — Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
- SentinelOne Vulnerability Database — CVE-2026-32202
- FortiGuard — MS.Windows.CVE-2026-32202.Shell.Spoofing IPS signature
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Get the cheat sheet →Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist — detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get the playbook →Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
