Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage

APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage

Posted on March 10, 2026 By CWS

The Russian hacking group APT28, also known by various aliases such as Fancy Bear and Sednit, has been actively employing malware named BEARDSHELL and COVENANT to conduct espionage on Ukrainian military forces. This cyber campaign, ongoing since April 2024, was detailed in a recent report by ESET, a Slovakian cybersecurity firm.

Background on APT28’s Espionage Tactics

APT28, a group affiliated with the Russian military intelligence agency GRU, has a history of deploying sophisticated cyber tools. Among their arsenal, BEARDSHELL and COVENANT stand out for their ability to enable long-term surveillance. These malware programs are complemented by SLIMAGENT, a tool capable of keylogging, screenshot capturing, and clipboard data collection, first documented by CERT-UA in mid-2025.

SLIMAGENT shares its lineage with XAgent, a tool used by APT28 in previous espionage efforts. Analysis by ESET highlights code similarities, particularly in keylogging behavior, with samples of XAgent from as far back as 2014. This suggests a continued evolution of APT28’s tools to maintain their operational capabilities.

Technical Insights into BEARDSHELL and SLIMAGENT

BEARDSHELL is designed to execute PowerShell commands on compromised systems, leveraging the Icedrive cloud service for command-and-control operations. A distinguishing feature of this tool is its use of an obfuscation technique known as opaque predicate, which it shares with XTunnel, a tool used in notable past cyber-attacks.

The connection between SLIMAGENT and XAgent is further evidenced by their shared use of HTML for logging espionage activities, with color-coded logs for easy identification of data points. These techniques signal a strategic approach by APT28 to obfuscate their activities while ensuring effective data exfiltration.

COVENANT’s Role and Strategic Adaptations

COVENANT, a modified .NET post-exploitation framework, has been adapted to use the Filen cloud storage service for command-and-control since July 2025. This adaptation reflects APT28’s ongoing commitment to enhancing their cyber capabilities, particularly against Ukrainian targets.

ESET’s report highlights how APT28’s expertise in modifying open-source tools like COVENANT allows them to bypass traditional defenses, maintaining an edge in cyber espionage. The group’s history of using dual implants, as seen in previous operations, underscores their tactical flexibility and persistence.

These developments signify a continued threat to Ukraine and potentially other nations, as APT28’s tools and techniques evolve. Understanding and countering such sophisticated cyber threats remain critical for national security and global cyber defense strategies.

The Hacker News Tags:APT28, BEARDSHELL, COVENANT, cyber espionage, Cybersecurity, Filen cloud, GRU, Malware, PowerShell, Russian hacking, Sednit, SLIMAGENT, threat intelligence, Ukraine, XAgent

Post navigation

Previous Post: Kali Linux Boosts Offline AI Penetration Testing
Next Post: Webinar on Securing Vulnerable OT in a Connected World

Related Posts

Why CTEM is the Winning Bet for CISOs in 2025 Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools The Hacker News
CISA Highlights Exploited Vulnerabilities in Key Software CISA Highlights Exploited Vulnerabilities in Key Software The Hacker News
Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages The Hacker News
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks The Hacker News
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet Patches Critical Vulnerabilities in Key Products
  • Microsoft Addresses 83 Security Vulnerabilities in March Update
  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet Patches Critical Vulnerabilities in Key Products
  • Microsoft Addresses 83 Security Vulnerabilities in March Update
  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News