Executive Summary
In early 2026, cybersecurity researchers identified a sophisticated malware delivery method exploiting Rich Text Format (RTF) files. Attackers embedded malicious ZIP files within RTF documents, which, when opened, executed embedded scripts to download and install malware on the victim's system. This technique bypassed traditional security measures by leveraging the inherent trust in RTF files and the complexity of detecting embedded compressed files. The campaign targeted various sectors, leading to data breaches and operational disruptions.
This incident underscores the evolving tactics of cyber adversaries who continuously adapt to circumvent security defenses. The use of RTF files for malware delivery highlights the need for organizations to enhance their email filtering, user awareness training, and endpoint detection capabilities to mitigate such threats.
Why This Matters Now
The exploitation of RTF files for malware delivery represents a significant shift in attack vectors, emphasizing the urgency for organizations to reassess and strengthen their cybersecurity posture against increasingly sophisticated threats.
Attack Path Analysis
An attacker delivered a malicious RTF document via phishing email, exploiting vulnerabilities to execute a payload that established command and control, facilitated lateral movement, and exfiltrated sensitive data, culminating in significant operational disruption.
Kill Chain Progression
Initial Compromise
Description
The attacker sent a phishing email containing a malicious RTF document with embedded OLE objects that exploited vulnerabilities upon opening.
Related CVEs
CVE-2023-21716
CVSS 9.8A heap corruption vulnerability in Microsoft Word's RTF parser allows remote code execution when a user opens a specially crafted RTF document.
Affected Products:
Microsoft Office – 2007, 2010, 2013, 2016, 365
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Malicious File
Obfuscated Files or Information: Embedded Payloads
Masquerading: Double File Extension
Archive Collected Data: Archive via Library
Template Injection
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Data Protection
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
RTF-based malware delivery targeting financial institutions exploits document workflows, threatening encrypted traffic security and requiring enhanced egress filtering for data protection.
Health Care / Life Sciences
ZIP-embedded RTF attacks compromise HIPAA-regulated environments through malicious document processing, necessitating strengthened intrusion prevention and zero trust segmentation capabilities.
Government Administration
OLE object exploitation in government RTF documents enables lateral movement and command control, demanding robust threat detection and multicloud visibility solutions.
Legal Services
Document-centric law firms face elevated malware delivery risks through RTF files containing embedded ZIP containers, requiring comprehensive egress security enforcement.
Sources
- Quick Howto: ZIP Files Inside RTF, (Mon, Mar 2nd)https://isc.sans.edu/diary/rss/32696Verified
- CVE-2023-21716: Microsoft Word RCE Vulnerabilityhttps://www.netskope.com/blog/cve-2023-21716-microsoft-word-rce-vulnerabilityVerified
- PoC Exploit Released for Critical Windows Word Vulnerability CVE-2023-21716https://www.deepwatch.com/labs/poc-exploit-released-for-critical-windows-word-vulnerability-cve-2023-21716/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it would likely limit the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily focuses on network-level controls, its integration with identity-aware policies could potentially limit the attacker's ability to exploit vulnerabilities by enforcing strict access controls.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation would likely limit the attacker's ability to escalate privileges by enforcing strict access controls and segmenting workloads.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security would likely limit the attacker's lateral movement by enforcing strict segmentation and monitoring east-west traffic.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control would likely limit the attacker's ability to establish command and control channels by providing real-time monitoring and control over network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement would likely limit the attacker's ability to exfiltrate data by enforcing strict egress policies and monitoring outbound traffic.
While Aviatrix CNSF cannot entirely prevent operational disruption, its enforcement of strict segmentation and controlled egress policies would likely limit the scope of the attack, thereby reducing the overall impact.
Impact at a Glance
Affected Business Functions
- Document Management
- Email Communications
- File Sharing
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive corporate documents and communications.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Inline IPS (Suricata) to detect and block known exploit patterns and malicious payloads.
- • Deploy Cloud Firewall (ACF) to enforce egress filtering and control outbound traffic.
- • Utilize Zero Trust Segmentation to limit lateral movement within the network.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities.
- • Conduct regular user training to recognize and report phishing attempts.



