Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules

APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules

Posted on October 17, 2025October 17, 2025 By CWS

Russia’s APT28 has resurfaced in mid-2025 with a complicated spear-phishing marketing campaign that weaponizes Workplace paperwork to deploy two novel payloads: BeardShell, a C-based backdoor leveraging IceDrive as a command-and-control channel, and Covenant’s HTTP Grunt Stager, which communicates by way of the Koofr cloud API.

These malicious paperwork are distributed via non-public Sign chats, exploiting the appliance’s lack of Mark-of-the-Internet safety to slide previous Microsoft Workplace safety mechanisms.

Targets obtain messages mimicking inner authorized or administrative notifications, full with pressing prompts to open embedded paperwork that carry hidden macros.

Upon opening, the lure doc mechanically switches to Print Structure earlier than executing a Visible Primary for Purposes (VBA) macro that performs setting checks, deobfuscates payloads, and establishes persistence.

Sekoia analysts famous that the first macro performs a COM hijack by dropping a DLL (prnfldr.dll) alongside a benign-looking PNG file (home windows.png) and registering the DLL beneath the CLSIDPrinters registry key.

It then invokes regsvr32.exe with the /i parameter to set off the DLL’s set up routine, making certain execution even and not using a system reboot.

As soon as loaded by Explorer.exe, prnfldr.dll proxies official print capabilities and spawns a secondary thread to extract an AES-encrypted shellcode blob from the least important bits of every pixel in home windows.png.

This system embeds 20 bytes of measurement and hash metadata adopted by a 32-byte key, 16-byte IV, and encrypted content material inside the PNG picture information.

An infection chain (Supply – Sekoia)

After decryption, the shellcode initializes the Widespread Language Runtime and hundreds the Covenant .NET meeting, establishing an HTTP-based C2 channel with the Koofr infrastructure.

An infection Mechanism Deep Dive

The second stage reveals an ingenious use of digital steganography. The shellcode reads home windows.png, extracts the embedded payload, and calls the next capabilities to launch the Covenant Grunt Stager:

HRESULT hr;
ICLRMetaHost *pMetaHost = NULL;
pMetaHost->GetRuntime(L”v4.0.30319″, IID_ICLRRuntimeInfo, (LPVOID*)&pRuntimeInfo);
pRuntimeInfo->GetInterface(CLSID_CorRuntimeHost, IID_ICorRuntimeHost, (LPVOID*)&pCorRuntimeHost);
pCorRuntimeHost->Begin();
pCorRuntimeHost->ExecuteInDefaultAppDomain(L”C:pathGruntHTTPStager.dll”,
L”EntryPoint”, L”Execute”,
NULL, &hr);

As soon as lively, Covenant’s HTTP Grunt module communicates completely via Koofr’s API, creating “Protecting” and “Tansfering” folders to add reconnaissance information and obtain new modules.

The implant makes use of hybrid encryption to alternate session keys and orchestrates command execution by way of Covenant Duties, importing output as information earlier than deleting them to reduce forensic artifacts.

In the meantime, BeardShell operates independently as a C DLL. It initializes the CLR to load the System.Administration.Automation meeting and exposes a JSON-based interface for seven PowerShell-centric instructions.

Each 4 hours, BeardShell polls an IceDrive listing named by an FNV4 hash of host attributes.

It uploads SystemInfo outcomes to IceDrive and awaits operator-supplied JSON command information, which it decrypts and executes earlier than returning output to the storage root. Instructions observe the schema:

{“taskid”:0,”cmdid”:2,”information”:{“id”:0,”cmd”:”ipconfig /all”}}

This dual-payload technique demonstrates APT28’s evolving use of open-source frameworks and bonafide cloud companies for covert communications.

Embedding steganographic payloads in PNG information and leveraging a number of cloud channels considerably complicates detection and response, underscoring the necessity for enhanced steganography detection and cloud API monitoring.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT28, BEARDSHELL, COVENANT, Delivers, Documents, Modules, Office, Weaponized

Post navigation

Previous Post: Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026
Next Post: Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error

Related Posts

Top 10 Best Supply Chain Intelligence Security Companies in 2025 Top 10 Best Supply Chain Intelligence Security Companies in 2025 Cyber Security News
Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data Cyber Security News
Citrix Netscaler 0-day RCE Vulnerability Patched Citrix Netscaler 0-day RCE Vulnerability Patched Cyber Security News
Cloudflare Global Outage Breaks Internet Cloudflare Global Outage Breaks Internet Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online 28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News