Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

Specialist palliative care saves thousands and improves lives across the NHS

Six UK startups join ESA incubator to advance space technology

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 uses BEARDSHELL and COVENANT malware to spy on Ukrainian military
Identity

APT28 uses BEARDSHELL and COVENANT malware to spy on Ukrainian military

userBy userMarch 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 10, 2026Cyber ​​espionage/threat intelligence

A Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants called BEARDSHELL and COVENANT to facilitate long-term surveillance of Ukrainian military personnel.

In a new report shared with The Hacker News, ESET said the two malware families have been in use since April 2024.

APT28, also tracked as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard (formerly known as Strontium), FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is a state actor affiliated with Unit 26165 of the Russian Federation’s military intelligence agency GRU.

The threat actor’s malware arsenal consists of tools such as BEARDSHELL and COVENANT, as well as another program codenamed SLIMAGENT that can log keystrokes, capture screenshots, and collect clipboard data. SLIMAGENT was first publicly documented by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025.

According to the Slovak cybersecurity company, SLIMAGENT’s roots lie in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data leakage. This is based on code similarities discovered between SLIMAGENT and an unknown sample introduced in attacks targeting government agencies in two European countries in 2018.

The 2018 artifact and the 2024 SLIMAGENT sample are believed to originate from XAgent, and ESET’s analysis reveals keylogging overlap between SLIMAGENT and an XAgent sample that was actually detected in late 2014.

“SLIMAGENT outputs spy activity logs in HTML format, with application names, recorded keystrokes, and window names displayed in blue, red, and green, respectively,” ESET said. “The XAgent keylogger also generates HTML logs using the same color scheme.”

Associated with SLIMAGENT, another backdoor called BEARDSHELL has also been deployed that can execute PowerShell commands on compromised hosts. We use the official cloud storage service Icedrive for command and control (C2).

A notable aspect of this malware is that it utilizes a unique obfuscation technique called opaque predicates. This technology is also found in XTunnel (also known as X-Tunnel), a network traversal and pivot tool used by APT28 in the 2016 Democratic National Committee (DNC) hack. This tool provides a secure tunnel to an external C2 server.

“The shared use of this unusual obfuscation technique, combined with its co-location with SLIMAGENT, allows us to assess with high confidence that BEARDSHELL is part of Sednit’s custom arsenal,” ESET added.

The third major piece of a threat actor’s toolkit is COVENANT, an open source .NET post-exploitation framework. It has been “substantially” modified to support long-term espionage and implement a new cloud-based network protocol that exploits C2’s Filen cloud storage service starting in July 2025. Previously, the COVENANT variant of APT28 was said to be using pCloud (2023) and Koofr (2023). 2024-2025).

“These indications demonstrate that Sednit’s developers have gained deep expertise with Covenant, an implant that stopped formal development in April 2021 and was deemed unused by its advocates,” ESET said. “This surprising operational choice appears to have paid off. Sednit has successfully relied on the Covenant for several years, particularly against selected targets in Ukraine.”

This is not the first time a rival group has employed a dual-implant strategy. In 2021, Trellix revealed that APT28 deployed a Graphite backdoor using OneDrive for C2 and PowerShell Empire in attacks targeting government officials and defense sector individuals overseeing national security policy in West Asia.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEnergy apps turn neighbors into local clean energy power players
Next Article A guide to reducing your attack surface
user
  • Website

Related Posts

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

March 10, 2026

A guide to reducing your attack surface

March 10, 2026

Threat actors mass scan Salesforce Experience Cloud via modified AuraInspector tool

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

Specialist palliative care saves thousands and improves lives across the NHS

Six UK startups join ESA incubator to advance space technology

A guide to reducing your attack surface

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.