New APT 'Silent Geese' Deploys 'PoliGraph' Backdoor in Espionage Campaign Against NATO

'Silent Geese' APT Targets NATO Diplomats with Sophisticated Phishing and Novel 'PoliGraph' Malware

HIGH
February 16, 2026
5m read
Threat ActorPhishingMalware

Impact Scope

People Affected

Diplomatic personnel

Related Entities

Threat Actors

Silent Geese

Organizations

NATO SecuraIntel

Other

PoliGraph

Full Report

Executive Summary

Cybersecurity firm SecuraIntel has uncovered a sophisticated cyber-espionage campaign attributed to a new advanced persistent threat (APT) group dubbed Silent Geese. This state-sponsored actor is targeting diplomats and government officials within NATO member countries to gather intelligence on international security policy. The campaign leverages highly targeted spear-phishing emails containing a weaponized PDF, which deploys a previously unknown backdoor named PoliGraph. This malware establishes stealthy, persistent access and is equipped with a full suite of espionage tools, including keylogging and audio recording capabilities. The meticulous tradecraft and custom tooling indicate a well-resourced and patient adversary focused on high-value political and military intelligence.


Threat Overview

  • Threat Actor: Silent Geese (newly identified APT)
  • Suspected Affiliation: Nation-state (unspecified, non-NATO)
  • Targets: Diplomatic and government personnel in NATO member states
  • Objective: Cyber-espionage and intelligence gathering
  • Malware: PoliGraph (novel backdoor)

Silent Geese employs classic but effective APT tactics, combining social engineering with technical exploits to compromise high-value targets. The campaign's focus on an upcoming defense summit demonstrates the attackers' awareness of geopolitical events, allowing them to craft highly relevant and convincing phishing lures.

Technical Analysis

The attack chain follows a multi-stage process designed for stealth and persistence:

  1. Initial Access (T1566.001 - Spearphishing Attachment): The attacker sends a spear-phishing email impersonating a NATO administrative body. The email contains a PDF attachment described as a "preparatory brief" for a summit.
  2. Execution (T1204.002 - Malicious File): The victim opens the PDF, which exploits a vulnerability in a popular PDF reader to execute an embedded payload. Although the specific CVE is not mentioned, this leverages T1203 - Exploitation for Client Execution.
  3. Installation & Persistence (T1547.001 - Registry Run Keys / Startup Folder): The initial payload installs the PoliGraph backdoor, which establishes persistence on the host to survive reboots.
  4. Command and Control (T1071.004 - DNS): PoliGraph uses a clever C2 mechanism. It first communicates using what appears to be legitimate DNS queries to a C2 server for initial check-in and tasking. This is a common technique to blend in with normal network traffic.
  5. Secondary C2 Channel (T1573.001 - Symmetric Cryptography): After the initial DNS-based communication, the backdoor establishes a more robust, fully encrypted channel for transferring larger amounts of data and receiving complex commands.
  6. Collection: Once active, PoliGraph gathers intelligence using several methods:

Impact Assessment

The compromise of diplomatic communications and systems can have severe geopolitical consequences:

  • Intelligence Loss: The primary impact is the loss of sensitive government information, including negotiation strategies, policy documents, and intelligence reports.
  • Compromised Negotiations: Access to diplomatic correspondence gives the sponsoring nation-state a significant advantage in international relations and negotiations.
  • Erosion of Trust: Such attacks can erode trust between allied nations and within international organizations like NATO.
  • Further Intrusion: A compromised diplomatic machine can be used as a beachhead to pivot into other sensitive government networks.

Detection & Response

Detecting this campaign requires a multi-layered approach:

  1. Email Security: Use advanced email security gateways to scan for malicious attachments and analyze URLs for phishing indicators.
  2. DNS Tunneling Detection: Monitor DNS logs for anomalies that could indicate C2 communication. Look for unusually long domain names, high query frequency from a single host, or queries to non-standard domain zones. This is a key part of Network Traffic Analysis.
  3. Endpoint Monitoring: Deploy EDR solutions to monitor for suspicious process chains, such as a PDF reader spawning a command shell or an unknown executable. Monitor for API calls related to audio recording or keylogging.
  4. Patch Management: Ensure all client-side applications, especially PDF readers and web browsers, are kept up to date to prevent exploitation. See M1051 - Update Software.

Mitigation

Defending against a sophisticated APT like Silent Geese requires both technical and human-centric defenses:

  1. User Training (M1017 - User Training): Train high-value targets like diplomats to be skeptical of unsolicited emails, even if they appear to come from a legitimate source. Emphasize verification of sender identity through out-of-band channels.
  2. Application Hardening: Configure applications to limit their capabilities. For example, disable JavaScript and macros in document readers where possible.
  3. Network Egress Filtering: Restrict outbound network connections to only what is required for business purposes. Deny all traffic by default and only allow known-good protocols and destinations. This can disrupt C2 communications.
  4. Endpoint Isolation: For extremely high-value targets, consider using physically separate or virtualized machines for browsing the internet and checking personal email, isolating these activities from the machine containing sensitive work data.

Timeline of Events

1
February 16, 2026
This article was published

MITRE ATT&CK Mitigations

Train users, especially high-value targets, to recognize and report sophisticated spear-phishing attempts.

Use email and web filtering to block malicious attachments and known malicious domains used for C2.

Keep client-side applications like PDF readers and browsers patched to prevent exploitation.

Implement egress filtering to detect and block anomalous outbound traffic, such as DNS tunneling.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTSilent Geesecyber-espionagephishingNATObackdoorPoliGraph

📢 Share This Article

Help others stay informed about cybersecurity threats