Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules

Posted on October 17, 2025October 17, 2025 By CWS

Russia’s APT28 has resurfaced in mid-2025 with a complicated spear-phishing marketing campaign that weaponizes Workplace paperwork to deploy two novel payloads: BeardShell, a C-based backdoor leveraging IceDrive as a command-and-control channel, and Covenant’s HTTP Grunt Stager, which communicates by way of the Koofr cloud API.

These malicious paperwork are distributed via non-public Sign chats, exploiting the appliance’s lack of Mark-of-the-Internet safety to slide previous Microsoft Workplace safety mechanisms.

Targets obtain messages mimicking inner authorized or administrative notifications, full with pressing prompts to open embedded paperwork that carry hidden macros.

Upon opening, the lure doc mechanically switches to Print Structure earlier than executing a Visible Primary for Purposes (VBA) macro that performs setting checks, deobfuscates payloads, and establishes persistence.

Sekoia analysts famous that the first macro performs a COM hijack by dropping a DLL (prnfldr.dll) alongside a benign-looking PNG file (home windows.png) and registering the DLL beneath the CLSIDPrinters registry key.

It then invokes regsvr32.exe with the /i parameter to set off the DLL’s set up routine, making certain execution even and not using a system reboot.

As soon as loaded by Explorer.exe, prnfldr.dll proxies official print capabilities and spawns a secondary thread to extract an AES-encrypted shellcode blob from the least important bits of every pixel in home windows.png.

This system embeds 20 bytes of measurement and hash metadata adopted by a 32-byte key, 16-byte IV, and encrypted content material inside the PNG picture information.

An infection chain (Supply – Sekoia)

After decryption, the shellcode initializes the Widespread Language Runtime and hundreds the Covenant .NET meeting, establishing an HTTP-based C2 channel with the Koofr infrastructure.

An infection Mechanism Deep Dive

The second stage reveals an ingenious use of digital steganography. The shellcode reads home windows.png, extracts the embedded payload, and calls the next capabilities to launch the Covenant Grunt Stager:

HRESULT hr;
ICLRMetaHost *pMetaHost = NULL;
pMetaHost->GetRuntime(L”v4.0.30319″, IID_ICLRRuntimeInfo, (LPVOID*)&pRuntimeInfo);
pRuntimeInfo->GetInterface(CLSID_CorRuntimeHost, IID_ICorRuntimeHost, (LPVOID*)&pCorRuntimeHost);
pCorRuntimeHost->Begin();
pCorRuntimeHost->ExecuteInDefaultAppDomain(L”C:pathGruntHTTPStager.dll”,
L”EntryPoint”, L”Execute”,
NULL, &hr);

As soon as lively, Covenant’s HTTP Grunt module communicates completely via Koofr’s API, creating “Protecting” and “Tansfering” folders to add reconnaissance information and obtain new modules.

The implant makes use of hybrid encryption to alternate session keys and orchestrates command execution by way of Covenant Duties, importing output as information earlier than deleting them to reduce forensic artifacts.

In the meantime, BeardShell operates independently as a C DLL. It initializes the CLR to load the System.Administration.Automation meeting and exposes a JSON-based interface for seven PowerShell-centric instructions.

Each 4 hours, BeardShell polls an IceDrive listing named by an FNV4 hash of host attributes.

It uploads SystemInfo outcomes to IceDrive and awaits operator-supplied JSON command information, which it decrypts and executes earlier than returning output to the storage root. Instructions observe the schema:

{“taskid”:0,”cmdid”:2,”information”:{“id”:0,”cmd”:”ipconfig /all”}}

This dual-payload technique demonstrates APT28’s evolving use of open-source frameworks and bonafide cloud companies for covert communications.

Embedding steganographic payloads in PNG information and leveraging a number of cloud channels considerably complicates detection and response, underscoring the necessity for enhanced steganography detection and cloud API monitoring.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT28, BEARDSHELL, COVENANT, Delivers, Documents, Modules, Office, Weaponized

Post navigation

Previous Post: Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026
Next Post: Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error

Related Posts

Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts Cyber Security News
New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools Cyber Security News
Top 10 Best Ransomware Protection Solutions In 2025 Cyber Security News
50 World’s Best Cyber Security Companies in 2025 (March) Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
  • South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia
  • Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android
  • AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More
  • SIM Farm Dismantled in Europe, Seven Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
  • South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia
  • Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android
  • AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More
  • SIM Farm Dismantled in Europe, Seven Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News