By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
Computing

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

News Room
Last updated: 2026/04/08 at 12:10 PM
News Room Published 8 April 2026
Share
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
SHARE

Ravie LakshmananApr 08, 2026Vulnerability / Cloud Security

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX.

“PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro researchers Feike Hacquebord and Hiroyuki Kakara said in a technical report. The campaign is believed to be active since at least  September 2025.

The activity has targeted various sectors in Ukraine, including central executive bodies, hydrometeorology, defense, and emergency services, as well as rail logistics (Poland), maritime and transportation (Romania, Slovenia, Turkey), and logistical support partners involved in ammunition initiatives (Slovakia, Czech Republic), and military and NATO partners.

The campaign is notable for the rapid weaponization of newly disclosed flaws, such as CVE-2026-21509 and CVE-2026-21513, to breach targets of interest, with infrastructure preparation observed on January 12, 2026, exactly two weeks before the former was publicly disclosed.

In late February 2025, Akamai also disclosed that APT28 may have weaponized CVE-2026-21513 as a zero-day based on a Microsoft Shortcut (LNK) exploit that was uploaded to VirusTotal on January 30, 2026, well before the Windows maker pushed out a fix as part of its Patch Tuesday update on February 10, 2026.

This pattern of zero-day exploitation indicates that the threat actor had advanced knowledge of the vulnerabilities prior to them being revealed by Microsoft.

An interesting overlap between campaigns exploiting the two vulnerabilities is the domain “wellnesscaremed[.]com.” This commonality, combined with the timing of the two exploits, has raised the possibility that the threat actors are stringing together CVE-2026-21513 and CVE-2026-21509 into a sophisticated two-stage attack chain.

“The first vulnerability (CVE-2026-21509) forces the victim’s system to retrieve a malicious .LNK file, which then exploits the second vulnerability (CVE-2026-21513) to bypass security features and execute payloads without user warnings,” Trend Micro theorized.

The attacks culminate in the deployment of either MiniDoor, an Outlook email stealer, or a collection of interconnected malware components collectively known as PRISMEX, so named for the use of a steganographic technique to conceal payloads within image files. These include –

  • PrismexSheet, a malicious Excel dropper with VBA macros that extracts payloads embedded within the file using steganography, establishes persistence via COM hijacking, and displays a decoy document related to drone inventory lists and drone prices after macros are enabled.
  • PrismexDrop, a native dropper that readies the environment for follow-on exploitation and uses scheduled tasks and COM DLL hijacking for persistence.
  • PrismexLoader (aka PixyNetLoader), a proxy DLL that extracts the next-stage .NET payload scattered across a PNG image’s (“SplashScreen.png”) file structure using a bespoke “Bit Plane Round Robin” algorithm and runs it entirely in memory.
  • PrismexStager, a COVENANT Grunt implant that abuses Filen.io cloud storage for C2.

It’s worth mentioning here that some aspects of the campaign were previously documented by Zscaler ThreatLabz under the moniker Operation Neusploit. 

APT28’s use of COVENANT, an open-source command-and-control (C2) framework, was first highlighted by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. PrismexStager is assessed to be an expansion of MiniDoor and NotDoor (aka GONEPOSTAL), a Microsoft Outlook backdoor deployed by the hacking group in late 2025.

In at least one incident in October 2025, the COVENANT Grunt payload was found to not only facilitate information gathering, but also run a destructive wiper command that erases all files under the “%USERPROFILE%” directory. This dual capability lends weight to the hypothesis that these campaigns could be designed for both espionage and sabotage. 

“This operation demonstrates that Pawn Storm remains one of the most aggressive Russia-aligned intrusion sets,” Trend Micro said. “The targeting pattern reveals a strategic intent to compromise the supply chain and operational planning capabilities of Ukraine and its NATO partners.”

“The strategic focus on targeting the supply chains, weather services, and humanitarian corridors supporting Ukraine represents a shift toward operational disruption that may presage more destructive activities.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The best carry-on luggage in the UK, tested on an assault course The best carry-on luggage in the UK, tested on an assault course
Next Article Tailwind CSS 4.2 Ships Webpack Plugin, New Palettes and Logical Property Utilities Tailwind CSS 4.2 Ships Webpack Plugin, New Palettes and Logical Property Utilities
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The ‘Exit 8’ movie is here and for a limited time, get the video game for just .79 on Steam
The ‘Exit 8’ movie is here and for a limited time, get the video game for just $2.79 on Steam
News
The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon
The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon
Computing
Drew Barrymore’s Netflix Series With A Perfect Rotten Tomatoes Score Was Canceled Too Soon – BGR
Drew Barrymore’s Netflix Series With A Perfect Rotten Tomatoes Score Was Canceled Too Soon – BGR
News
Best Apple Deals of the Week: M5 MacBook Air Hits New Record Low Prices at 0 Off, Plus MacBook Pro Deals
Best Apple Deals of the Week: M5 MacBook Air Hits New Record Low Prices at $150 Off, Plus MacBook Pro Deals
News

You Might also Like

The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon
Computing

The AI Illusion (Part 2): The AI Detection Mirage | HackerNoon

10 Min Read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Computing

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

3 Min Read
Bitland WMI Laptop Driver Slated For Linux 7.1
Computing

Bitland WMI Laptop Driver Slated For Linux 7.1

1 Min Read
IBM shifts China R&D to overseas bases amid staff recruiting: report · TechNode
Computing

IBM shifts China R&D to overseas bases amid staff recruiting: report · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?