Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat
Identity

APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat

userBy userJune 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananMalware/Threat Intelligence

Contract with Beard Shell Malware

The Ukrainian Computer Emergency Response Team (CERT-UA) has warned about a new cyberattack campaign by APT28 (aka UAC-0001) related to Russia, about threat actors using signal chat messages to provide two new malware families called Beardshell and Covenant.

BeardShell per CERT-UA is written in C++ and provides the ability to download and run PowerShell scripts, and uploads the results of the execution to a remote server on the ICEDRIVE API.

The agency said it first observed Beardshell, along with a screenshot taker named Slimagent, as part of its March-April incident response efforts on Windows computers.

At that time, there was no details about how the infection occurred, but the agency said it received threat information from ESET more than a year later that evidence of unauthorized access to its “Gov.ua” email account had been detected.

Cybersecurity

The exact nature of the information shared has not been revealed, but it may be related to a report from Slovak Cybersecurity Company last month about the exploitation of APT28 of various webmail software cross-site scripting (XSS) vulnerability to RoundCube, Horde, Mdaemon and Zimbra.

This discovery was triggered as a result of the discovery of important evidence, including the initial access vector used in the 2024 attack, the existence of Beard Shell, and the malware framework called Contracts.

Specifically, it has been revealed that threat actors are sending messages over the signal to deliver the Macro Race Microsoft Word Document (“aop.doc”).

The embedded macro also makes changes to the Windows registry so that the DLL will be launched the next time the file Explorer (“Explorer.exe”) is launched. The main task of the DLL is to load shellcode from a PNG file, which runs the Memory Resident Covenant Framework.

The Covenant then downloads two intermediate payloads designed to launch a Beardshell backdoor to the compromised host.

It is recommended to be aware of domain-related network traffic to mitigate potential risks associated with threats.[.]net “and” api.icedrive[.]net. “

It occurs when CERT-UA reveals targeting APT28 for outdated round cube webmail instances in Ukraine and provides exploits for CVE-2020-35730, CVE-2021-44026, and CVE-2020-2641.

Cybersecurity

The email stated that “content bait in the form of articles in the publication “NV” (NV.UA) and exploits of the RoundCube XSS vulnerability CVE-2020-35730 and corresponding JavaScript code designed to download and run additional JavaScript files: ‘Q.JS’ and ‘e.js’ ect-ua.

In addition to excluding victim address books and session cookies via HTTP posting requests, “E.JS” ensures that you create mailbox rules to redirect incoming emails to third-party email addresses. Meanwhile, “Q.JS” features an exploit of SQL injection defects in RoundCube (CVE-2021-44026) that is used to collect information from the RoundCube database.

CERT-UA also found a third JavaScript file named “C.JS” containing the exploit of the third round cube defect (CVE-2020-12641) to run any command on the mail server. Overall, similar phishing emails have been sent to email addresses of more than 40 Ukrainian organizations.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleImprove indoor air quality one block at a time
Next Article How Step Programmes Enhance UK Industrial Strategy
user
  • Website

Related Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

June 24, 2025

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

June 24, 2025

Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Amazon will spend more than $4 billion to expand its major delivery to rural US communities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.