Russian APT28 Deploys 'PRISMEX' Malware in Spear-Phishing Campaign Targeting Ukraine and NATO Nations

APT28 Unleashes New 'PRISMEX' Malware on Ukraine and NATO Allies

HIGH
April 8, 2026
April 28, 2026
5m read
Threat ActorMalwareCyberattack

Related Entities(initial)

Threat Actors

APT28Forest BlizzardPawn Storm

Organizations

MicrosoftTrend Micro

Other

Czech RepublicNATOPRISMEXPolandRomaniaSlovakiaSloveniaTurkeyUkraine

CVE Identifiers

Full Report(when first published)

Executive Summary

Researchers at Trend Micro have identified a new, sophisticated malware suite named PRISMEX, which is being deployed by the Russian state-sponsored threat actor APT28 (also known as Forest Blizzard and Pawn Storm). The ongoing spear-phishing campaign, active since at least September 2025, is focused on espionage against Ukraine and its NATO allies. Targets include central government bodies, defense organizations, and critical transportation and logistics entities in Ukraine, Poland, Romania, Slovenia, Turkey, Slovakia, and the Czech Republic. The PRISMEX malware is notable for its advanced feature set, which includes the use of steganography to conceal malicious code within image files, Component Object Model (COM) hijacking for persistence, and the abuse of cloud services for command-and-control (C2). The campaign also highlights APT28's agility in weaponizing vulnerabilities, including the potential zero-day exploitation of CVE-2026-21513.


Threat Overview

This campaign is a continuation of APT28's long-standing mission to conduct espionage in support of Russian strategic interests. The primary delivery vector is spear-phishing emails tailored to the target organizations. The goal is to deploy the PRISMEX malware suite, which acts as a versatile toolkit for long-term intelligence gathering. The selection of targets—defense, government, and logistics in countries supporting Ukraine—clearly indicates that the campaign's objective is to gather intelligence on military movements, government policies, and logistical supply chains. The use of advanced evasion techniques suggests that the attackers are targeting mature organizations with established security defenses and are investing significant resources to remain undetected.


Technical Analysis

The PRISMEX malware suite and associated TTPs demonstrate a high level of sophistication:

  • Initial Access: The campaign likely begins with spear-phishing containing malicious links or attachments that exploit vulnerabilities like CVE-2026-21509 or CVE-2026-21513 (a Microsoft Shortcut LNK flaw).
  • Defense Evasion (Steganography): T1001.002 - Steganography: PRISMEX hides its malicious payloads within seemingly benign image files (e.g., .png, .jpg). The malware downloads these images from a C2 server and then extracts and executes the hidden code. This allows the malicious content to bypass simple network-based content filters.
  • Persistence (COM Hijacking): T1546.015 - Component Object Model Hijacking: The malware establishes persistence by hijacking COM objects. It modifies registry keys associated with legitimate COM objects to point to the malicious PRISMEX DLL. When a legitimate application or the OS attempts to use the hijacked COM object, the malware is executed instead.
  • Command and Control: T1102 - Web Service: The attackers abuse legitimate cloud services for C2 communication, blending their malicious traffic with normal network activity to evade detection.
  • Rapid Vulnerability Weaponization: APT28 demonstrated the ability to quickly operationalize newly disclosed vulnerabilities. They were also observed potentially using CVE-2026-21513 as a zero-day, with an exploit appearing on VirusTotal weeks before Microsoft released a patch.

Impact Assessment

A successful compromise by PRISMEX would grant APT28 a persistent foothold inside highly sensitive government and military-related networks. The potential impact includes:

  • Strategic Intelligence Theft: Exfiltration of classified documents, military plans, diplomatic communications, and details on ammunition shipments to Ukraine.
  • Disruption of Logistics: Intelligence gathered on rail and maritime logistics could be used to kinetically or digitally disrupt supply chains supporting Ukraine's defense efforts.
  • Long-Term Espionage: The stealthy nature of the malware allows for long-term monitoring of target organizations, providing a continuous stream of intelligence to the Russian government.
  • Compromise of NATO Security: By targeting multiple NATO members, the campaign poses a direct threat to the security and operational integrity of the alliance.

Cyber Observables for Detection

Type
registry_key
Value
HKCU\Software\Classes\CLSID\
Description
The location where APT28 modifies keys for COM hijacking.
Context
Monitor for changes to CLSID registry keys, especially those pointing to DLLs in unusual locations.
Confidence
high
Type
network_traffic_pattern
Value
Image file downloads from non-standard domains
Description
The malware downloads PNG/JPG files containing hidden payloads.
Context
Monitor network logs for endpoints downloading image files from uncategorized or suspicious URLs.
Confidence
medium
Type
file_name
Value
*.lnk
Description
The initial access vector may involve a malicious LNK file.
Context
Monitor for the creation and execution of LNK files from email attachments or web downloads.
Confidence
medium
Type
log_source
Value
Proxy Logs
Description
Look for connections to known legitimate cloud services (e.g., Dropbox, Google Drive) that deviate from baseline user behavior.
Context
Egress proxy or firewall logs.
Confidence
medium

Detection & Response

Detection:

  1. Registry Monitoring: Use an EDR or file integrity monitoring tool to watch for modifications to COM-related registry keys under HKEY_CURRENT_USER\Software\Classes\CLSID and HKEY_CLASSES_ROOT\CLSID. This is the most reliable way to detect the persistence mechanism. D3-SFA - System File Analysis.
  2. Network Content Inspection: Where possible, use network security tools capable of deep packet inspection to analyze image files for anomalies that might suggest steganography, although this is technically challenging.
  3. Behavioral Analysis: Monitor for processes that load DLLs from unusual file paths after interacting with the registry, which could indicate a successful COM hijack execution.

Response:

  • Isolate the compromised host from the network.
  • Use forensic tools to examine the registry for hijacked COM keys to identify the malicious DLL.
  • Block the C2 domains identified from network or endpoint analysis.
  • Re-image the compromised machine, as simply deleting the malware file is insufficient to remove the persistence.

Mitigation

  • Patch Management: M1051 - Update Software: Aggressively patch all systems, especially for vulnerabilities known to be used by APT28, such as the Microsoft Shortcut flaw CVE-2026-21513.
  • Attack Surface Reduction: Implement ASR rules to block Office applications from creating executable content and to block process creations originating from PsExec and WMI commands, which are common lateral movement techniques for APT28.
  • Application Control: M1038 - Execution Prevention: Use application control solutions to prevent the execution of unauthorized DLLs. This can directly block the malicious PRISMEX DLL from being loaded via the COM hijack.
  • User Account Control: M1026 - Privileged Account Management: Enforce the principle of least privilege. The COM hijacking technique used by PRISMEX often relies on user-level registry modification, but limiting administrative privileges can prevent more damaging follow-on activity.

Timeline of Events

1
September 1, 2025
The PRISMEX campaign begins targeting Ukraine and its allies.
2
January 12, 2026
APT28 is observed preparing infrastructure related to CVE-2026-21509.
3
January 30, 2026
An exploit for CVE-2026-21513 is uploaded to VirusTotal, suggesting potential zero-day use by APT28.
4
February 10, 2026
Microsoft releases a patch for CVE-2026-21513.
5
April 8, 2026
This article was published

Article Updates

April 28, 2026

Severity increased

Microsoft confirms active exploitation of CVE-2026-32202, a Windows Shell flaw, which is a bypass for CVE-2026-21510. Both are linked to APT28's exploit chain, including CVE-2026-21513.

Microsoft has confirmed active exploitation of CVE-2026-32202, a Windows Shell spoofing vulnerability, patched in April 2026. This flaw is an incomplete fix for CVE-2026-21510, which was previously weaponized by APT28 (Forest Blizzard/Fancy Bear). Crucially, CVE-2026-21510 was used by APT28 in an exploit chain alongside CVE-2026-21513, a vulnerability mentioned in the original report on the PRISMEX malware. This update highlights APT28's continued focus on Windows Shell vulnerabilities for initial access, demonstrating their agility in bypassing patches and maintaining their exploit capabilities. Organizations are urged to apply the latest Microsoft updates immediately to mitigate this actively exploited threat.

Timeline of Events

1
September 1, 2025

The PRISMEX campaign begins targeting Ukraine and its allies.

2
January 12, 2026

APT28 is observed preparing infrastructure related to CVE-2026-21509.

3
January 30, 2026

An exploit for CVE-2026-21513 is uploaded to VirusTotal, suggesting potential zero-day use by APT28.

4
February 10, 2026

Microsoft releases a patch for CVE-2026-21513.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

COM HijackingEspionageGeopoliticsSteganographyZero-Day

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.