top of page

APT28 Employs BEARDSHELL and COVENANT Malware in Ongoing Espionage Against Ukrainian Military

  • Mar 11
  • 2 min read

Key Findings


  • APT28, a Russian state-sponsored hacking group, has been observed using a pair of custom malware implants called BEARDSHELL and COVENANT for long-term surveillance of Ukrainian military personnel since April 2024.

  • The malware families showcase the group's continued capabilities in developing advanced custom tools for espionage operations.

  • BEARDSHELL is a C++ backdoor that downloads and executes PowerShell scripts, sending results via the Icedrive cloud storage service.

  • SLIMAGENT, another implant linked to APT28, is found to have evolved from the group's earlier XAgent keylogger, exhibiting strong code similarities.

  • COVENANT, an open-source .NET post-exploitation framework, has been heavily modified by APT28 to support long-term espionage and leverage cloud services like Filen for command-and-control.


Background


  • APT28, also known as Fancy Bear, is a prolific Russian state-sponsored hacking group affiliated with the Russian military intelligence agency GRU.

  • The group has targeted governments, militaries, and security organizations worldwide since at least 2007.

  • APT28 was involved in the 2016 attacks on the U.S. Democratic National Committee (DNC) and has a long history of sophisticated cyber espionage operations.


BEARDSHELL Backdoor


  • BEARDSHELL is a C++ backdoor that can download and execute PowerShell scripts, sending the results back to the attacker via the Icedrive cloud storage service.

  • The malware creates a unique folder on each infected machine based on system identifiers to maintain persistence.

  • BEARDSHELL employs a rare obfuscation technique called "opaque predicate," which has also been observed in XTunnel, a tool used by APT28 in the 2016 DNC hack.


SLIMAGENT Keylogger


  • SLIMAGENT is another implant linked to APT28, capable of capturing screenshots, logging keystrokes, and collecting clipboard data.

  • Analysis shows that SLIMAGENT has evolved from the group's earlier XAgent keylogger, with strong code similarities, including identical keylogging logic and HTML-based logging.

  • The SLIMAGENT samples deployed in 2024 exhibit additional features, such as data encryption, compared to the 2018 samples, indicating the group's continued development efforts.


COVENANT Framework


  • COVENANT is an open-source .NET post-exploitation framework that has been heavily modified by APT28 to support long-term espionage operations.

  • The group has adapted COVENANT to use cloud storage services like Filen for command-and-control communications, demonstrating their expertise in leveraging and customizing publicly available tools.

  • The COVENANT variant used by APT28 has been in use since at least 2023, with the group successfully relying on it for several years, particularly in targeting Ukrainian organizations.


Sources


  • https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html

  • https://securityaffairs.com/189230/apt/apt28-conducts-long-term-espionage-on-ukrainian-forces-using-custom-malware.html

  • https://www.reddit.com/r/SecOpsDaily/comments/1rpv2im/apt28_uses_beardshell_and_covenant_malware_to_spy/

  • https://x.com/CSec88/status/2031363112746758432

  • https://x.com/TheCyberSecHub/status/2031336854885380296

  • https://www.linkedin.com/posts/dlross_apt28-uses-beardshell-and-covenant-malware-activity-7437240894883532800-Cja1

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page