{"id":45241,"date":"2026-04-09T05:26:54","date_gmt":"2026-04-08T21:26:54","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies\/"},"modified":"2026-04-09T05:26:54","modified_gmt":"2026-04-08T21:26:54","slug":"apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies\/","title":{"rendered":"APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhBiilqDko4PDmo2Iu-E-25PRzUJ2LygbHdv1RsdA31AkJBL9QB3AzdxV_4j-jo2Xf9wXwlienf17HO_uJyiue3JOWNfTFdln4gXJcounilzPxOsIXpN5g6imDW3ta0jt4Ck3UYinAmWwHZqfxYhjuaFnOIowTmZbNedv3AmS7Qlze1-tD2gkJBuUxTzSml\/s1600\/nato.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhBiilqDko4PDmo2Iu-E-25PRzUJ2LygbHdv1RsdA31AkJBL9QB3AzdxV_4j-jo2Xf9wXwlienf17HO_uJyiue3JOWNfTFdln4gXJcounilzPxOsIXpN5g6imDW3ta0jt4Ck3UYinAmWwHZqfxYhjuaFnOIowTmZbNedv3AmS7Qlze1-tD2gkJBuUxTzSml\/s1600\/nato.jpg\" alt=\"APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies\"\/><\/a><\/div>\n<p>The Russian threat actor known&nbsp;as <strong><a href=\"https:\/\/thehackernews.com\/2026\/04\/russian-state-linked-apt28-exploits.html\">APT28<\/a><\/strong> (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite&nbsp;codenamed <strong>PRISMEX<\/strong>.<\/p>\n<p>&#8220;PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,&#8221; Trend Micro researchers Feike Hacquebord and Hiroyuki&nbsp;Kakara <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/pawn-storm-targets-govt-infra.html\">said<\/a> in a technical report. The&nbsp;campaign is believed to be active since at least &#8239;September&nbsp;2025.<\/p>\n<p>The activity has targeted various sectors in Ukraine, including central executive bodies, hydrometeorology, defense, and emergency services, as well as rail logistics (Poland), maritime and transportation (Romania, Slovenia,&#8239;Turkey), and logistical support partners involved in ammunition initiatives (Slovakia, Czech Republic), and military and NATO&nbsp;partners.<\/p>\n<p>The campaign is notable for the rapid weaponization of newly disclosed flaws, such&nbsp;as <a href=\"https:\/\/thehackernews.com\/2026\/02\/apt28-uses-microsoft-office-cve-2026.html\">CVE-2026-21509<\/a>&nbsp;and <a href=\"https:\/\/thehackernews.com\/2026\/03\/apt28-tied-to-cve-2026-21513-mshtml-0.html\">CVE-2026-21513<\/a>, to breach targets of interest, with infrastructure preparation observed on January 12, 2026, exactly two weeks before the former was publicly disclosed.<\/p>\n<p>In late February 2025, Akamai also disclosed that APT28 may have weaponized CVE-2026-21513 as a zero-day based on a Microsoft Shortcut (LNK) exploit that was uploaded to VirusTotal on January 30, 2026, well before the Windows maker pushed out a fix as part of its Patch Tuesday update on February 10,&nbsp;2026.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>This pattern of zero-day exploitation indicates that the threat actor had advanced knowledge of the vulnerabilities prior to them being revealed by Microsoft.<\/p>\n<p>An interesting overlap between campaigns exploiting the two vulnerabilities is the domain &#8220;wellnesscaremed[.]com.&#8221; This commonality, combined with the timing of the two exploits, has raised the possibility that the threat actors are stringing together CVE-2026-21513 and CVE-2026-21509 into a sophisticated two-stage attack&nbsp;chain.<\/p>\n<p>&#8220;The first vulnerability (CVE-2026-21509) forces the victim&#8217;s system to retrieve a malicious .LNK&nbsp;file, which then exploits the second vulnerability (CVE-2026-21513) to bypass security features and execute payloads without user warnings,&#8221; Trend Micro theorized.<\/p>\n<p>The attacks culminate in the deployment of&nbsp;either <a href=\"https:\/\/thehackernews.com\/2026\/02\/apt28-uses-microsoft-office-cve-2026.html\">MiniDoor<\/a>, an Outlook email stealer, or a collection of interconnected malware components collectively known as PRISMEX, so named for the use of a steganographic technique to conceal payloads within image files. These&nbsp;include&nbsp;&#8211;<\/p>\n<ul>\n<li><strong>PrismexSheet<\/strong>, a malicious Excel dropper with VBA macros that extracts payloads embedded within the&#8239;file using steganography, establishes persistence via <a href=\"https:\/\/attack.mitre.org\/techniques\/T1546\/015\/\">COM hijacking<\/a>, and displays a decoy document related to drone inventory lists and drone prices after macros are enabled.<\/li>\n<li><strong>PrismexDrop<\/strong>, a native dropper that readies the environment for follow-on exploitation and uses scheduled tasks and COM DLL hijacking for persistence.<\/li>\n<li><strong>PrismexLoader<\/strong> (aka PixyNetLoader), a proxy DLL that extracts the next-stage .NET&nbsp;payload scattered across a PNG image&#8217;s (&#8220;SplashScreen.png&#8221;) file structure using a bespoke &#8220;Bit Plane Round Robin&#8221; algorithm and runs it entirely in memory.<\/li>\n<li><strong>PrismexStager<\/strong>, a COVENANT Grunt implant that abuses&#8239;Filen.io&nbsp;cloud storage for C2.<\/li>\n<\/ul>\n<p>It&#8217;s worth mentioning here that some aspects of the campaign were previously documented by Zscaler ThreatLabz under the&nbsp;moniker <a href=\"https:\/\/thehackernews.com\/2026\/02\/apt28-uses-microsoft-office-cve-2026.html\">Operation&nbsp;Neusploit<\/a>.&nbsp;<\/p>\n<p>APT28&#8217;s use&nbsp;of <a href=\"https:\/\/thehackernews.com\/2026\/03\/apt28-uses-beardshell-and-covenant.html\">COVENANT<\/a>, an open-source command-and-control (C2) framework, was first highlighted by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. PrismexStager&#8239;is assessed to be an expansion of MiniDoor&nbsp;and <a href=\"https:\/\/thehackernews.com\/2025\/09\/russian-apt28-deploys-notdoor-outlook.html\">NotDoor<\/a> (aka GONEPOSTAL), a Microsoft Outlook backdoor deployed by the hacking group in late&nbsp;2025.<\/p>\n<p>In at least one incident in October 2025, the COVENANT Grunt payload was found to not only facilitate information gathering, but also run a destructive wiper command that erases all files under the &#8220;%USERPROFILE%&#8221; directory. This dual capability lends weight to the hypothesis that these campaigns could be designed for both espionage and sabotage.&nbsp;<\/p>\n<p>&#8220;This&#8239;operation&#8239;demonstrates&#8239;that Pawn Storm&#8239;remains&#8239;one of the most aggressive Russia-aligned&#8239;intrusion sets,&#8221; Trend Micro said. &#8220;The targeting pattern reveals a strategic intent to compromise the supply chain and operational planning capabilities of Ukraine and its NATO partners.&#8221;<\/p>\n<p>&#8220;The strategic focus on&#8239;targeting the supply chains, weather services, and humanitarian corridors supporting Ukraine&#8239;represents a shift toward operational disruption that may presage more destructive activities.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Russian threat actor known&nbsp;as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite&nbsp;codenamed PRISMEX.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45241","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45241"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45241\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}==========================