APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是APT28这个俄罗斯威胁行为者发起的新鱼叉式网络钓鱼活动,目标是乌克兰及其盟友。他们使用了名为PRISMEX的恶意软件套件,结合了隐写术、COM劫持和滥用云服务。攻击还利用了两个零日漏洞CVE-2026-21509和CVE-2026-21513,显示出APT28提前掌握了这些漏洞的信息。 攻击活动针对乌克兰的多个部门以及波兰、罗马尼亚等国的物流和运输行业。PRISMEX套件包括多个组件,如PrismexSheet、PrismexDrop等,这些组件通过隐写术隐藏在图像文件中,并利用云存储进行C2通信。此外,攻击还可能用于破坏性活动,如擦除用户文件。 总结时要涵盖APT28、新活动、目标国家、恶意软件特点以及零日漏洞的利用。同时要简洁明了,在100字以内。 </think> 俄罗斯威胁行为者APT28发起新鱼叉式网络钓鱼活动,利用新型恶意软件PRISMEX针对乌克兰及其盟友展开攻击。该活动结合隐写术、COM劫持及云服务滥用,并利用两个零日漏洞CVE-2026-21509和CVE-2026-21513快速武器化。攻击目标涉及乌克兰政府机构及多国关键部门,显示出战略破坏意图。 2026-4-8 13:50:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Vulnerability / Cloud Security

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX.

"PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control," Trend Micro researchers Feike Hacquebord and Hiroyuki Kakara said in a technical report. The campaign is believed to be active since at least  September 2025.

The activity has targeted various sectors in Ukraine, including central executive bodies, hydrometeorology, defense, and emergency services, as well as rail logistics (Poland), maritime and transportation (Romania, Slovenia, Turkey), and logistical support partners involved in ammunition initiatives (Slovakia, Czech Republic), and military and NATO partners.

The campaign is notable for the rapid weaponization of newly disclosed flaws, such as CVE-2026-21509 and CVE-2026-21513, to breach targets of interest, with infrastructure preparation observed on January 12, 2026, exactly two weeks before the former was publicly disclosed.

In late February 2025, Akamai also disclosed that APT28 may have weaponized CVE-2026-21513 as a zero-day based on a Microsoft Shortcut (LNK) exploit that was uploaded to VirusTotal on January 30, 2026, well before the Windows maker pushed out a fix as part of its Patch Tuesday update on February 10, 2026.

This pattern of zero-day exploitation indicates that the threat actor had advanced knowledge of the vulnerabilities prior to them being revealed by Microsoft.

An interesting overlap between campaigns exploiting the two vulnerabilities is the domain "wellnesscaremed[.]com." This commonality, combined with the timing of the two exploits, has raised the possibility that the threat actors are stringing together CVE-2026-21513 and CVE-2026-21509 into a sophisticated two-stage attack chain.

"The first vulnerability (CVE-2026-21509) forces the victim's system to retrieve a malicious .LNK file, which then exploits the second vulnerability (CVE-2026-21513) to bypass security features and execute payloads without user warnings," Trend Micro theorized.

The attacks culminate in the deployment of either MiniDoor, an Outlook email stealer, or a collection of interconnected malware components collectively known as PRISMEX, so named for the use of a steganographic technique to conceal payloads within image files. These include -

  • PrismexSheet, a malicious Excel dropper with VBA macros that extracts payloads embedded within the file using steganography, establishes persistence via COM hijacking, and displays a decoy document related to drone inventory lists and drone prices after macros are enabled.
  • PrismexDrop, a native dropper that readies the environment for follow-on exploitation and uses scheduled tasks and COM DLL hijacking for persistence.
  • PrismexLoader (aka PixyNetLoader), a proxy DLL that extracts the next-stage .NET payload scattered across a PNG image's ("SplashScreen.png") file structure using a bespoke "Bit Plane Round Robin" algorithm and runs it entirely in memory.
  • PrismexStager, a COVENANT Grunt implant that abuses Filen.io cloud storage for C2.

It's worth mentioning here that some aspects of the campaign were previously documented by Zscaler ThreatLabz under the moniker Operation Neusploit

APT28's use of COVENANT, an open-source command-and-control (C2) framework, was first highlighted by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. PrismexStager is assessed to be an expansion of MiniDoor and NotDoor (aka GONEPOSTAL), a Microsoft Outlook backdoor deployed by the hacking group in late 2025.

In at least one incident in October 2025, the COVENANT Grunt payload was found to not only facilitate information gathering, but also run a destructive wiper command that erases all files under the "%USERPROFILE%" directory. This dual capability lends weight to the hypothesis that these campaigns could be designed for both espionage and sabotage. 

"This operation demonstrates that Pawn Storm remains one of the most aggressive Russia-aligned intrusion sets," Trend Micro said. "The targeting pattern reveals a strategic intent to compromise the supply chain and operational planning capabilities of Ukraine and its NATO partners."

"The strategic focus on targeting the supply chains, weather services, and humanitarian corridors supporting Ukraine represents a shift toward operational disruption that may presage more destructive activities."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html
如有侵权请联系:admin#unsafe.sh