Russian military hackers revive advanced malware to spy on Ukraine, researchers say
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是俄罗斯的网络间谍组织APT28重新活跃起来,使用了新的工具来监视乌克兰的目标。他们用的是BeardShell和Covenant这两种植入工具,主要针对乌克兰的军事人员。ESET的研究报告指出,这些活动可能与2022年俄罗斯入侵乌克兰有关。 接下来,我需要把这些关键点浓缩到100字以内。要确保包括APT28、工具名称、目标以及背景信息。同时,避免使用“这篇文章”或“内容总结”这样的开头。 可能的结构是:APT28复活了间谍工具,针对乌克兰军事人员,使用BeardShell和Covenant,ESET报告指出这可能与俄乌冲突有关。 检查一下字数是否合适,大约在90字左右。这样应该符合用户的要求。 </think> 俄罗斯网络间谍组织APT28复活了其高级间谍工具BeardShell和Covenant,针对乌克兰军事人员展开间谍活动。该组织自2004年起活跃,并在俄乌冲突后加强了行动。 2026-3-10 11:45:45 Author: therecord.media(查看原文) 阅读量:12 收藏

Russian state hacker group APT28 has revived a sophisticated cyber-espionage toolkit to spy on Ukrainian targets, including military personnel, according to a report published Tuesday by cybersecurity firm ESET.

ESET said the group’s advanced development team has reemerged since April 2024 with a renewed arsenal built around two implants known as BeardShell and Covenant, often deployed together in espionage campaigns.

APT28, also known as Fancy Bear, Sednit, Forest Blizzard or BlueDelta, has operated since at least 2004. The U.S. Justice Department previously linked the group to Unit 26165 of Russia’s GRU military intelligence agency and blamed it for high-profile cyber operations, including the 2016 hack of the Democratic National Committee.

During the 2010s, APT28 used a wide range of sophisticated malware tools for cyber espionage, including powerful backdoors such as Xagent and Sedreco. ESET said that around 2019, the group appeared to change its approach: its advanced malware was rarely observed in the wild as the hackers relied more heavily on phishing campaigns using simpler tools. Researchers say the reason for this shift remains unclear.

One of the first signs of the renewed activity came in April 2024, when CERT-UA discovered a spying program known as SlimAgent on a Ukrainian government computer, according to ESET. The malware is capable of recording keystrokes, capturing screenshots and collecting clipboard data. ESET said SlimAgent appears to be an updated version of the Xagent keylogger module and attributed it to APT28 with high confidence.

Researchers also identified BeardShell, a more sophisticated implant that allows attackers to execute PowerShell commands on compromised machines. Since its discovery in 2024, ESET said BeardShell has continued to appear in espionage operations through 2025 and into 2026, primarily in long-term surveillance of Ukrainian military personnel.

To maintain long-term access to victims’ systems, the hackers often deploy BeardShell alongside another tool known as Covenant, an open-source command-and-control framework first released in 2019. The framework allows attackers to monitor victims, steal data and move through networks to reach additional targets.

ESET says APT28 developers have heavily modified Covenant in recent years and appear to be positioning it as their primary espionage tool, with BeardShell serving as a fallback in case the main infrastructure is disrupted.

The renewed use of sophisticated custom malware may have intensified following Russia’s invasion of Ukraine in 2022, according to ESET. Another possible explanation, the researcher said, is that the developers never stopped working but instead became more cautious.

Last month, researchers discovered a “sophisticated espionage campaign” by APT28 that exploited a Microsoft Office vulnerability to target maritime, transportation and diplomatic entities in countries including Ukraine, Poland, Slovenia, Turkey, Greece and the United Arab Emirates.

The group’s activity has also caused diplomatic disputes in Europe. In December, Germany summoned Russia’s ambassador after accusing APT28 of carrying out a cyberattack on its air traffic control authority and running a disinformation campaign ahead of its 2024 federal election.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russia-apt-28-revives-malware-to-spy-on-ukraine
如有侵权请联系:admin#unsafe.sh