Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage

APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage

Posted on March 10, 2026 By CWS

The Russian hacking group APT28, also known by various aliases such as Fancy Bear and Sednit, has been actively employing malware named BEARDSHELL and COVENANT to conduct espionage on Ukrainian military forces. This cyber campaign, ongoing since April 2024, was detailed in a recent report by ESET, a Slovakian cybersecurity firm.

Background on APT28’s Espionage Tactics

APT28, a group affiliated with the Russian military intelligence agency GRU, has a history of deploying sophisticated cyber tools. Among their arsenal, BEARDSHELL and COVENANT stand out for their ability to enable long-term surveillance. These malware programs are complemented by SLIMAGENT, a tool capable of keylogging, screenshot capturing, and clipboard data collection, first documented by CERT-UA in mid-2025.

SLIMAGENT shares its lineage with XAgent, a tool used by APT28 in previous espionage efforts. Analysis by ESET highlights code similarities, particularly in keylogging behavior, with samples of XAgent from as far back as 2014. This suggests a continued evolution of APT28’s tools to maintain their operational capabilities.

Technical Insights into BEARDSHELL and SLIMAGENT

BEARDSHELL is designed to execute PowerShell commands on compromised systems, leveraging the Icedrive cloud service for command-and-control operations. A distinguishing feature of this tool is its use of an obfuscation technique known as opaque predicate, which it shares with XTunnel, a tool used in notable past cyber-attacks.

The connection between SLIMAGENT and XAgent is further evidenced by their shared use of HTML for logging espionage activities, with color-coded logs for easy identification of data points. These techniques signal a strategic approach by APT28 to obfuscate their activities while ensuring effective data exfiltration.

COVENANT’s Role and Strategic Adaptations

COVENANT, a modified .NET post-exploitation framework, has been adapted to use the Filen cloud storage service for command-and-control since July 2025. This adaptation reflects APT28’s ongoing commitment to enhancing their cyber capabilities, particularly against Ukrainian targets.

ESET’s report highlights how APT28’s expertise in modifying open-source tools like COVENANT allows them to bypass traditional defenses, maintaining an edge in cyber espionage. The group’s history of using dual implants, as seen in previous operations, underscores their tactical flexibility and persistence.

These developments signify a continued threat to Ukraine and potentially other nations, as APT28’s tools and techniques evolve. Understanding and countering such sophisticated cyber threats remain critical for national security and global cyber defense strategies.

The Hacker News Tags:APT28, BEARDSHELL, COVENANT, cyber espionage, Cybersecurity, Filen cloud, GRU, Malware, PowerShell, Russian hacking, Sednit, SLIMAGENT, threat intelligence, Ukraine, XAgent

Post navigation

Previous Post: Kali Linux Boosts Offline AI Penetration Testing
Next Post: Webinar on Securing Vulnerable OT in a Connected World

Related Posts

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks The Hacker News
Learn to Spot Risks and Patch Safely with Community-Maintained Tools Learn to Spot Risks and Patch Safely with Community-Maintained Tools The Hacker News
U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes .74 Million U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million The Hacker News
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs The Hacker News
New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs The Hacker News
ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark