Weaponized Office Documents Enable APT28 to Deliver BeardShell and Covenant
Analysis by Sekoia.io’s Threat Detection and Response (TDR) team, corroborated by CERT-UA’s June 2025 report, attributes the activity to the GRU-operated cyber unit (GTsSS, Military Unit 26165).
The campaign targets Ukrainian military personnel through spearphishing messages delivered over the encrypted messaging application Signal.
Unlike traditional phishing channels, attackers used Signal Desktop to send malicious Word documents disguised as Ukrainian military or administrative paperwork.
The choice of Signal is strategic: its desktop version does not enforce Microsoft’s Mark of the Web (MOTW) security tag, allowing macros to execute even when documents are downloaded from external sources.
Upon opening the file, macros activate a multistage payload chain. They alter document view settings, execute data deobfuscation routines, and register a COM hijack by creating the following registry key:HKCUSoftwareclassesCLSID{2227A280-3AEA-1069-A2DE-08002B30309D}InProcServer32.
These key points to C:ProgramDataprnfldr.dll, a disguised malicious library that mimics a legitimate Windows print handler. The macro also drops a second file windows.png, containing hidden shellcode.
Once executed, the DLL decrypts and extracts the shellcode embedded in the least significant bits (LSB) of the PNG pixels.
The shellcode then loads a .NET assembly identified as GruntHTTPStager from the Covenant framework, establishing an API-driven command-and-control (C2) channel via the legitimate Koofr cloud storage platform.
The malware interacts with cloud directories to upload reconnaissance results and retrieve encrypted modules, such as screenshots and network discovery tasks.
Further in the chain, Covenant is believed to deliver PlaySndSrv.dll and sample-03.wav, which decrypt and install BeardShell, a C++ backdoor conducting cloud-based communications through Icedrive.
BeardShell uses a simple XOR cipher for string encryption and relies on a hardcoded bearer token to connect to Icedrive accounts. Once active, it executes SystemInfo, uploads host details, and polls cloud directories every four hours for new command files.
The campaign’s weaponized Office documents impersonating legitimate Ukrainian military forms suggest a clear intelligence-gathering objective aimed at identifying unit composition, logistics, and operational resilience.
The combination of Signal-based delivery, steganography, and multi-cloud C2 channels demonstrates APT28’s continued sophistication and adaptability in conducting cyberespionage against Ukrainian military infrastructure.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Weaponized Office Documents Enable APT28 to Deliver BeardShell and Covenant appeared first on Cyber Security News.
If you're a Windows user who's looking for a PC version of the Apple Mac…
INDIANA, (WOWO): Voters across northeast Indiana will head to the polls on May 5, 2026,…
INDIANA, (WOWO): Voters across northeast Indiana will head to the polls on May 5, 2026,…
GRANT COUNTY, Ind. (WOWO): A 73-year-old man from Upland died Monday morning after a single-vehicle…
GRANT COUNTY, Ind. (WOWO): A 73-year-old man from Upland died Monday morning after a single-vehicle…
WHITLEY COUNTY, Ind.— Authorities have determined that a man who died following an officer-involved shooting…
This website uses cookies.