Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CTEM conversations we all need

National BioSecurity Centre to Protect the People from Animal Diseases

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat
Identity

APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat

userBy userJune 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananMalware/Threat Intelligence

Contract with Beard Shell Malware

The Ukrainian Computer Emergency Response Team (CERT-UA) has warned about a new cyberattack campaign by APT28 (aka UAC-0001) related to Russia, about threat actors using signal chat messages to provide two new malware families called Beardshell and Covenant.

BeardShell per CERT-UA is written in C++ and provides the ability to download and run PowerShell scripts, and uploads the results of the execution to a remote server on the ICEDRIVE API.

The agency said it first observed Beardshell, along with a screenshot taker named Slimagent, as part of its March-April incident response efforts on Windows computers.

At that time, there was no details about how the infection occurred, but the agency said it received threat information from ESET more than a year later that evidence of unauthorized access to its “Gov.ua” email account had been detected.

Cybersecurity

The exact nature of the information shared has not been revealed, but it may be related to a report from Slovak Cybersecurity Company last month about the exploitation of APT28 of various webmail software cross-site scripting (XSS) vulnerability to RoundCube, Horde, Mdaemon and Zimbra.

This discovery was triggered as a result of the discovery of important evidence, including the initial access vector used in the 2024 attack, the existence of Beard Shell, and the malware framework called Contracts.

Specifically, it has been revealed that threat actors are sending messages over the signal to deliver the Macro Race Microsoft Word Document (“aop.doc”).

The embedded macro also makes changes to the Windows registry so that the DLL will be launched the next time the file Explorer (“Explorer.exe”) is launched. The main task of the DLL is to load shellcode from a PNG file, which runs the Memory Resident Covenant Framework.

The Covenant then downloads two intermediate payloads designed to launch a Beardshell backdoor to the compromised host.

It is recommended to be aware of domain-related network traffic to mitigate potential risks associated with threats.[.]net “and” api.icedrive[.]net. “

It occurs when CERT-UA reveals targeting APT28 for outdated round cube webmail instances in Ukraine and provides exploits for CVE-2020-35730, CVE-2021-44026, and CVE-2020-2641.

Cybersecurity

The email stated that “content bait in the form of articles in the publication “NV” (NV.UA) and exploits of the RoundCube XSS vulnerability CVE-2020-35730 and corresponding JavaScript code designed to download and run additional JavaScript files: ‘Q.JS’ and ‘e.js’ ect-ua.

In addition to excluding victim address books and session cookies via HTTP posting requests, “E.JS” ensures that you create mailbox rules to redirect incoming emails to third-party email addresses. Meanwhile, “Q.JS” features an exploit of SQL injection defects in RoundCube (CVE-2021-44026) that is used to collect information from the RoundCube database.

CERT-UA also found a third JavaScript file named “C.JS” containing the exploit of the third round cube defect (CVE-2020-12641) to run any command on the mail server. Overall, similar phishing emails have been sent to email addresses of more than 40 Ukrainian organizations.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleClinical tests to improve animal health
Next Article How Step Programmes Enhance UK Industrial Strategy
user
  • Website

Related Posts

CTEM conversations we all need

June 24, 2025

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

June 24, 2025

US Homes ban WhatsApp on Official Devices Over Security and Data Protection Issues

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CTEM conversations we all need

National BioSecurity Centre to Protect the People from Animal Diseases

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

US Homes ban WhatsApp on Official Devices Over Security and Data Protection Issues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.