Summarize with:

Share
On March 11, 2026, ESET detailed how APT28 (aka Sednit/Fancy Bear) has reactivated a more advanced malware pipeline centered on BeardShell, SlimAgent, and a heavily modified Covenant framework to sustain espionage against Ukrainian military personnel and related government targets. The campaign has been active since April 2024, with researchers observing continued deployment through 2025 and 2026.
For defenders, the story matters because it combines a modernized advanced persistent threat toolkit with resilient cloud-based command-and-control channels, deterministic host identifiers, and fallback implants designed to survive infrastructure disruption. In practice, this raises the bar for hunting, especially in environments where cloud storage traffic blends into normal operations.
The clearest confirmed impact is on Ukrainian military personnel and Ukrainian government environments, but the broader exposure pattern likely includes:
Where direct victim lists are unavailable, defenders should assume risk is highest where politically relevant users are exposed to phishing, malicious documents, or cloud-service-assisted post-exploitation.
ESET's reporting suggests a layered espionage workflow rather than a single one-shot intrusion path.
| Stage | Observed behavior | Defensive implication |
|---|---|---|
| Initial access | Malicious docs and phishing remain plausible entry routes; recent adjacent operations used Office exploitation | Block document-based delivery and isolate high-risk users |
| Execution | SlimAgent and BeardShell execute collection and PowerShell-driven actions | Watch script execution plus unusual .NET runtime behavior |
| Persistence | Modified Covenant supports stable long-term operator visibility | Hunt for recurring host identifiers and repeat beacon patterns |
| C2 | BeardShell abused Icedrive; Covenant variants used Filen, Koofr, and pCloud | Treat unusual cloud-storage traffic as possible C2, not just SaaS usage |
| Actions on objectives | Credential collection, surveillance, screenshots, clipboard theft, and operator tasking | Prioritize data exposure mapping and identity containment |
This campaign does not hinge on a single static IOC. Defenders should focus on behavior and telemetry correlation.
splindex=edr OR index=proxy | eval cloud_c2=if(match(url, "(?i)(icedrive|filen|koofr|pcloud)"), 1, 0) | stats count values(process_name) values(parent_process_name) values(dest_domain) by host user | where cloud_c2=1
kqlDeviceNetworkEvents | where RemoteUrl has_any ("icedrive", "filen", "koofr", "pcloud") | summarize hits=count(), processes=make_set(InitiatingProcessFileName, 10) by DeviceName, InitiatingProcessAccountName | where hits > 3
The real trend here is not just that APT28 is active again. It is that mature state-backed operators are leaning into three durable advantages:
That combination is a strong signal for defenders in 2026: sophisticated espionage teams are optimizing for long-dwell access, operational continuity, and reduced dependence on obviously malicious infrastructure.
APT28 was publicly linked to a renewed malware toolkit using BeardShell, SlimAgent, and a customized Covenant framework to spy on Ukrainian targets.
Confirmed targeting centers on Ukrainian military personnel and government systems, with broader risk for defense, diplomatic, and adjacent regional entities.
BeardShell executes PowerShell commands and abuses Icedrive for C2, while showing code traits linked to APT28's historic toolset.
APT28 heavily modified the open-source framework for long-term espionage, including deterministic host IDs and cloud-based communications.
Hunt for abnormal cloud-storage traffic, preserve endpoint telemetry, isolate suspicious hosts, and reset credentials for exposed users.
No. Current reporting indicates sustained activity from 2024 through 2026 rather than a single short campaign.
Published: 2026-03-11 Author: Invaders Cybersecurity Classification: Public / TLP:CLEAR Reading Time: 7 minutes
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Threat Hunting & IntelTCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels The most important detail in Elastic's new TCLBANKER research is not just that a Bra...
Threat Hunting & IntelDAEMON Tools supply-chain attack turns trusted installers into a malware delivery path The most important part of the DAEMON Tools incident is not that malware...
Threat Hunting & IntelCVE-2026-41940 turns exposed cPanel and WHM servers into control-plane takeover targets CVE-2026-41940 is a critical authentication bypass in cPanel and WHM, an...