By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
Computing

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

News Room
Last updated: 2026/03/10 at 9:02 AM
News Room Published 10 March 2026
Share
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
SHARE

Ravie LakshmananMar 10, 2026Cyber Espionage / Threat Intelligence

The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long‑term surveillance of Ukrainian military personnel.

The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News.

APT28, also tracked as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is a nation-state actor affiliated with Unit 26165 of the Russian Federation’s military intelligence agency GRU.

The threat actor’s malware arsenal consists of tools like BEARDSHELL and COVENANT, along with another program codenamed SLIMAGENT that’s capable of logging keystrokes, capturing screenshots, and collecting clipboard data. SLIMAGENT was first publicly documented by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025.

SLIMAGENT, per the Slovakian cybersecurity company, has its roots in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data exfiltration. This is based on code similarities discovered between SLIMAGENT and previously unknown samples deployed in attacks targeting governmental entities in two European countries as far back as 2018.

It’s assessed that the 2018 artifacts and the 2024 SLIMAGENT sample originated from XAgent, with ESET’s analysis uncovering overlaps in the keylogging between SLIMAGENT and an XAgent sample detected in the wild in late 2014.

“SLIMAGENT emits its espionage logs in the HTML format, with the application name, the logged keystrokes, and the window name in blue, red, and green, respectively,” ESET said. “The XAgent keylogger also produces HTML logs using the same color scheme.”

Also deployed in connection with SLIMAGENT is another backdoor referred to as BEARDSHELL that’s capable of executing PowerShell commands on compromised hosts. It uses the legitimate cloud storage service Icedrive for command-and-control (C2).

A noteworthy aspect of the malware is that it utilizes a distinctive obfuscation technique referred to as opaque predicate, which is also found in XTunnel (aka X-Tunnel), a network traversal and pivoting tool used by APT28 in the 2016 Democratic National Committee (DNC) hack. The tool provides a secure tunnel to an external C2 server.

“The shared use of this rare obfuscation technique, combined with its colocation with SLIMAGENT, leads us to assess with high confidence that BEARDSHELL is part of Sednit’s custom arsenal,” ESET added.

A third major piece of the threat actor’s toolkit is COVENANT, an open-source .NET post-exploitation framework that has been “heavily” modified to support long-term espionage and to implement a new cloud-based network protocol that abuses the Filen cloud storage service for C2 since July 2025. Previously, APT28’s COVENANT variant was said to have used pCloud (in 2023) and Koofr (in 2024-2025).

“These adaptations show that Sednit developers acquired deep expertise in Covenant – an implant whose official development ceased in April 2021 and may have been considered unused by defenders,” ESET said. “This surprising operational choice appears to have paid off: Sednit has successfully relied on Covenant for several years, particularly against selected targets in Ukraine.”

This is not the first time the adversarial collective has embraced the dual-implant strategy. In 2021, Trellix revealed that APT28 deployed Graphite, a backdoor that employed OneDrive for C2, and PowerShell Empire in attacks targeting high-ranking government officials overseeing national security policy and individuals in the defense sector in Western Asia.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR
Next Article Amazon Kindle Paperwhite drops to Black Friday pricing Amazon Kindle Paperwhite drops to Black Friday pricing
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

ChatGPT now offers interactive visuals for math, science learning
ChatGPT now offers interactive visuals for math, science learning
News
MacBook Neo Will Have Day One Software Update
MacBook Neo Will Have Day One Software Update
News
Swedish Legal Tech Startup Legora Triples Valuation To .55B With 0M Series D Led By Accel
Swedish Legal Tech Startup Legora Triples Valuation To $5.55B With $550M Series D Led By Accel
News
New Patch Can Boost Linux ZRAM Compression Performance By Over 50%
New Patch Can Boost Linux ZRAM Compression Performance By Over 50%
Computing

You Might also Like

New Patch Can Boost Linux ZRAM Compression Performance By Over 50%
Computing

New Patch Can Boost Linux ZRAM Compression Performance By Over 50%

1 Min Read
US reportedly orders top EDA firms to halt services to China · TechNode
Computing

US reportedly orders top EDA firms to halt services to China · TechNode

1 Min Read
Decide AI wants to replace manual spreadsheet analysis with AI
Computing

Decide AI wants to replace manual spreadsheet analysis with AI

14 Min Read
Why Using “^” Instead of “
Computing

Why Using “^” Instead of “

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?