APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读这篇文章,理解它的主要内容。 文章讲的是俄罗斯支持的黑客组织APT28,他们使用了BEARDSHELL和COVENANT这两种恶意软件来长期监视乌克兰的军事人员。这些工具是从2024年4月开始使用的。此外,还有SLIMAGENT这个恶意软件,它能够记录键盘输入、截图和收集剪贴板数据。SLIMAGENT的起源可以追溯到XAgent,这是APT28在2010年代使用的工具。 BEARDSHELL使用Icedrive云存储作为命令控制中心,并且使用了一种叫做opaque predicate的混淆技术,这在XTunnel中也有使用。COVENANT是一个经过大量修改的开源框架,利用Filen云存储进行C2通信。 总结一下,文章主要讲述了APT28如何利用这些恶意软件对乌克兰进行网络间谍活动,并且提到了这些工具的技术细节和历史背景。接下来,我需要将这些信息浓缩到100字以内,并且用简洁的语言表达出来。 </think> 俄罗斯支持的黑客组织APT28利用BEARDSHELL和COVENANT恶意软件长期监视乌克兰军事人员。这些工具自2024年4月起被部署,并与SLIMAGENT结合使用以窃取数据。SLIMAGENT源于早期XAgent工具,并采用独特混淆技术。COVENANT经过修改以支持长期间谍活动,并滥用云存储服务进行控制通信。 2026-3-10 10:55:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Cyber Espionage / Threat Intelligence

The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long‑term surveillance of Ukrainian military personnel.

The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News.

APT28, also tracked as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is a nation-state actor affiliated with Unit 26165 of the Russian Federation's military intelligence agency GRU.

The threat actor's malware arsenal consists of tools like BEARDSHELL and COVENANT, along with another program codenamed SLIMAGENT that's capable of logging keystrokes, capturing screenshots, and collecting clipboard data. SLIMAGENT was first publicly documented by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025.

SLIMAGENT, per the Slovakian cybersecurity company, has its roots in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data exfiltration. This is based on code similarities discovered between SLIMAGENT and previously unknown samples deployed in attacks targeting governmental entities in two European countries as far back as 2018.

It's assessed that the 2018 artifacts and the 2024 SLIMAGENT sample originated from XAgent, with ESET's analysis uncovering overlaps in the keylogging between SLIMAGENT and an XAgent sample detected in the wild in late 2014.

"SLIMAGENT emits its espionage logs in the HTML format, with the application name, the logged keystrokes, and the window name in blue, red, and green, respectively," ESET said. "The XAgent keylogger also produces HTML logs using the same color scheme."

Also deployed in connection with SLIMAGENT is another backdoor referred to as BEARDSHELL that's capable of executing PowerShell commands on compromised hosts. It uses the legitimate cloud storage service Icedrive for command-and-control (C2).

A noteworthy aspect of the malware is that it utilizes a distinctive obfuscation technique referred to as opaque predicate, which is also found in XTunnel (aka X-Tunnel), a network traversal and pivoting tool used by APT28 in the 2016 Democratic National Committee (DNC) hack. The tool provides a secure tunnel to an external C2 server.

"The shared use of this rare obfuscation technique, combined with its colocation with SLIMAGENT, leads us to assess with high confidence that BEARDSHELL is part of Sednit's custom arsenal," ESET added.

A third major piece of the threat actor's toolkit is COVENANT, an open-source .NET post-exploitation framework that has been "heavily" modified to support long-term espionage and to implement a new cloud-based network protocol that abuses the Filen cloud storage service for C2 since July 2025. Previously, APT28's COVENANT variant was said to have used pCloud (in 2023) and Koofr (in 2024-2025).

"These adaptations show that Sednit developers acquired deep expertise in Covenant – an implant whose official development ceased in April 2021 and may have been considered unused by defenders," ESET said. "This surprising operational choice appears to have paid off: Sednit has successfully relied on Covenant for several years, particularly against selected targets in Ukraine."

This is not the first time the adversarial collective has embraced the dual-implant strategy. In 2021, Trellix revealed that APT28 deployed Graphite, a backdoor that employed OneDrive for C2, and PowerShell Empire in attacks targeting high-ranking government officials overseeing national security policy and individuals in the defense sector in Western Asia.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
如有侵权请联系:admin#unsafe.sh