Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Posted on June 24, 2025June 24, 2025 By CWS

Jun 24, 2025Ravie LakshmananMalware / Menace Intelligence
The Laptop Emergency Response Staff of Ukraine (CERT-UA) has warned of a brand new cyber assault marketing campaign by the Russia-linked APT28 (aka UAC-0001) risk actors utilizing Sign chat messages to ship two new malware households dubbed BEARDSHELL and COVENANT.
BEARDSHELL, per CERT-UA, is written in C++ and gives the power to obtain and execute PowerShell scripts, in addition to add the outcomes of the execution again to a distant server over the Icedrive API.
The company stated it first noticed BEARDSHELL, alongside a screenshot-taking device named SLIMAGENT, as a part of incident response efforts in March-April 2024 in a Home windows laptop.
Whereas at the moment, there have been no particulars obtainable on how the an infection occurred, the company stated it obtained risk intelligence from ESET greater than a yr later that detected proof of unauthorized entry to a “gov.ua” e mail account.

The precise nature of the knowledge shared was not disclosed, nevertheless it probably pertains to a report from the Slovak cybersecurity firm final month that detailed APT28’s exploitation of cross-site scripting (XSS) vulnerabilities in numerous webmail software program akin to Roundcube, Horde, MDaemon, and Zimbra to breach Ukrainian authorities entities.
Additional investigation triggered on account of this discovery unearthed essential proof, together with the preliminary entry vector used within the 2024 assault, in addition to the presence of BEARDSHELL and a malware framework dubbed COVENANT.
Particularly, it has come to gentle that the risk actors are sending messages on Sign to ship a macro-laced Microsoft Phrase doc (“Акт.doc”), which, when launched, drops two payloads: A malicious DLL (“ctec.dll”) and a PNG picture (“home windows.png”).
The embedded macro additionally makes Home windows Registry modifications to make sure that the DLL is launched when the File Explorer (“explorer.exe”) is launched the following time. The first process of the DLL is to load the shellcode from the PNG file, ensuing within the execution of the memory-resident COVENANT framework.

COVENANT subsequently downloads two extra intermediate payloads which might be designed to launch the BEARDSHELL backdoor on the compromised host.
To mitigate potential dangers related to the risk, state organizations are advisable to control community site visitors related to the domains “app.koofr[.]internet” and “api.icedrive[.]internet.”
The disclosure comes as CERT-UA revealed APT28’s concentrating on of outdated Roundcube webmail situations in Ukraine to ship exploits for CVE-2020-35730, CVE-2021-44026, and CVE-2020-12641 by way of phishing emails that ostensibly include textual content about information occasions however weaponize these flaws to execute arbitrary JavaScript.

The e-mail “contained a content material bait within the type of an article from the publication ‘NV’ (nv.ua), in addition to an exploit for the Roundcube XSS vulnerability CVE-2020-35730 and the corresponding JavaScript code designed to obtain and run further JavaScript recordsdata: ‘q.js’ and ‘e.js,'” CERT-UA stated.
“E.js” ensures the creation of a mailbox rule for redirecting incoming emails to a third-party e mail deal with, along with exfiltrating the sufferer’s deal with ebook and session cookies by way of HTTP POST requests. Then again, “q.js” options an exploit for an SQL injection flaw in Roundcube (CVE-2021-44026) that is used to collect data from the Roundcube database.
CERT-UA stated it additionally found a 3rd JavaScript file named “c.js” that features an exploit for a 3rd Roundcube flaw (CVE-2020-12641) to execute arbitrary instructions on the mail server. In all, related phishing emails have been despatched to the e-mail addresses of greater than 40 Ukrainian organizations.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:APT28, BEARDSHELL, Chat, COVENANT, Deploy, Malware, Signal, Ukraine

Post navigation

Previous Post: Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams 
Next Post: U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

Related Posts

Key Insights from the 2025 State of Pentesting Report The Hacker News
VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries The Hacker News
Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack The Hacker News
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News