{"id":539,"date":"2026-04-08T16:29:44","date_gmt":"2026-04-08T16:29:44","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=539"},"modified":"2026-04-08T16:29:44","modified_gmt":"2026-04-08T16:29:44","slug":"apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=539","title":{"rendered":"APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 08, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Cloud Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhBiilqDko4PDmo2Iu-E-25PRzUJ2LygbHdv1RsdA31AkJBL9QB3AzdxV_4j-jo2Xf9wXwlienf17HO_uJyiue3JOWNfTFdln4gXJcounilzPxOsIXpN5g6imDW3ta0jt4Ck3UYinAmWwHZqfxYhjuaFnOIowTmZbNedv3AmS7Qlze1-tD2gkJBuUxTzSml\/s1700-e365\/nato.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>The Russian threat actor known\u00a0as <strong>APT28<\/strong> (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite\u00a0codenamed <strong>PRISMEX<\/strong>.<\/p>\n<p>\u00abPRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,\u00bb Trend Micro researchers Feike Hacquebord and Hiroyuki\u00a0Kakara <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/pawn-storm-targets-govt-infra.html\">said<\/a> in a technical report. The\u00a0campaign is believed to be active since at least \u202fSeptember\u00a02025.<\/p>\n<p>The activity has targeted various sectors in Ukraine, including central executive bodies, hydrometeorology, defense, and emergency services, as well as rail logistics (Poland), maritime and transportation (Romania, Slovenia,\u202fTurkey), and logistical support partners involved in ammunition initiatives (Slovakia, Czech Republic), and military and NATO\u00a0partners.<\/p>\n<p>The campaign is notable for the rapid weaponization of newly disclosed flaws, such\u00a0as CVE-2026-21509\u00a0and CVE-2026-21513, to breach targets of interest, with infrastructure preparation observed on January 12, 2026, exactly two weeks before the former was publicly disclosed.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>In late February 2025, Akamai also disclosed that APT28 may have weaponized CVE-2026-21513 as a zero-day based on a Microsoft Shortcut (LNK) exploit that was uploaded to VirusTotal on January 30, 2026, well before the Windows maker pushed out a fix as part of its Patch Tuesday update on February 10,\u00a02026.<\/p>\n<p>This pattern of zero-day exploitation indicates that the threat actor had advanced knowledge of the vulnerabilities prior to them being revealed by Microsoft.<\/p>\n<p>An interesting overlap between campaigns exploiting the two vulnerabilities is the domain \u00abwellnesscaremed[.]com.\u00bb This commonality, combined with the timing of the two exploits, has raised the possibility that the threat actors are stringing together CVE-2026-21513 and CVE-2026-21509 into a sophisticated two-stage attack\u00a0chain.<\/p>\n<p>\u00abThe first vulnerability (CVE-2026-21509) forces the victim&#8217;s system to retrieve a malicious .LNK\u00a0file, which then exploits the second vulnerability (CVE-2026-21513) to bypass security features and execute payloads without user warnings,\u00bb Trend Micro theorized.<\/p>\n<p>The attacks culminate in the deployment of\u00a0either <a href=\"https:\/\/thehackernews.com\/2026\/02\/apt28-uses-microsoft-office-cve-2026.html\">MiniDoor, an Outlook email stealer, or a collection of interconnected malware components collectively known as PRISMEX, so named for the use of a steganographic technique to conceal payloads within image files. These\u00a0include\u00a0&#8211;<\/p>\n<ul>\n<li><strong>PrismexSheet<\/strong>, a malicious Excel dropper with VBA macros that extracts payloads embedded within the\u202ffile using steganography, establishes persistence via <a href=\"https:\/\/attack.mitre.org\/techniques\/T1546\/015\/\">COM hijacking<\/a>, and displays a decoy document related to drone inventory lists and drone prices after macros are enabled.<\/li>\n<li><strong>PrismexDrop<\/strong>, a native dropper that readies the environment for follow-on exploitation and uses scheduled tasks and COM DLL hijacking for persistence.<\/li>\n<li><strong>PrismexLoader<\/strong> (aka PixyNetLoader), a proxy DLL that extracts the next-stage .NET\u00a0payload scattered across a PNG image&#8217;s (\u00abSplashScreen.png\u00bb) file structure using a bespoke \u00abBit Plane Round Robin\u00bb algorithm and runs it entirely in memory.<\/li>\n<li><strong>PrismexStager<\/strong>, a COVENANT Grunt implant that abuses\u202fFilen.io\u00a0cloud storage for C2.<\/li>\n<\/ul>\n<p>It&#8217;s worth mentioning here that some aspects of the campaign were previously documented by Zscaler ThreatLabz under the\u00a0moniker Operation\u00a0Neusploit.\u00a0<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>APT28&#8217;s use\u00a0of COVENANT, an open-source command-and-control (C2) framework, was first highlighted by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. PrismexStager\u202fis assessed to be an expansion of MiniDoor\u00a0and NotDoor (aka GONEPOSTAL), a Microsoft Outlook backdoor deployed by the hacking group in late\u00a02025.<\/p>\n<p>In at least one incident in October 2025, the COVENANT Grunt payload was found to not only facilitate information gathering, but also run a destructive wiper command that erases all files under the \u00ab%USERPROFILE%\u00bb directory. This dual capability lends weight to the hypothesis that these campaigns could be designed for both espionage and sabotage.\u00a0<\/p>\n<p>\u00abThis\u202foperation\u202fdemonstrates\u202fthat Pawn Storm\u202fremains\u202fone of the most aggressive Russia-aligned\u202fintrusion sets,\u00bb Trend Micro said. \u00abThe targeting pattern reveals a strategic intent to compromise the supply chain and operational planning capabilities of Ukraine and its NATO partners.\u00bb<\/p>\n<p>\u00abThe strategic focus on\u202ftargeting the supply chains, weather services, and humanitarian corridors supporting Ukraine\u202frepresents a shift toward operational disruption that may presage more destructive activities.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 08, 2026Vulnerability \/ Cloud Security The Russian threat actor known\u00a0as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1124,112,6,297,42,1123,1122,431,451],"class_list":["post-539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-allies","tag-apt28","tag-campaign","tag-deploys","tag-malware","tag-nato","tag-prismex","tag-targeting","tag-ukraine"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=539"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/540"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}