Researchers at Trend Micro have identified a new, sophisticated malware suite named PRISMEX, which is being deployed by the Russian state-sponsored threat actor APT28 (also known as Forest Blizzard and Pawn Storm). The ongoing spear-phishing campaign, active since at least September 2025, is focused on espionage against Ukraine and its NATO allies. Targets include central government bodies, defense organizations, and critical transportation and logistics entities in Ukraine, Poland, Romania, Slovenia, Turkey, Slovakia, and the Czech Republic. The PRISMEX malware is notable for its advanced feature set, which includes the use of steganography to conceal malicious code within image files, Component Object Model (COM) hijacking for persistence, and the abuse of cloud services for command-and-control (C2). The campaign also highlights APT28's agility in weaponizing vulnerabilities, including the potential zero-day exploitation of CVE-2026-21513.
This campaign is a continuation of APT28's long-standing mission to conduct espionage in support of Russian strategic interests. The primary delivery vector is spear-phishing emails tailored to the target organizations. The goal is to deploy the PRISMEX malware suite, which acts as a versatile toolkit for long-term intelligence gathering. The selection of targets—defense, government, and logistics in countries supporting Ukraine—clearly indicates that the campaign's objective is to gather intelligence on military movements, government policies, and logistical supply chains. The use of advanced evasion techniques suggests that the attackers are targeting mature organizations with established security defenses and are investing significant resources to remain undetected.
The PRISMEX malware suite and associated TTPs demonstrate a high level of sophistication:
T1001.002 - Steganography: PRISMEX hides its malicious payloads within seemingly benign image files (e.g., .png, .jpg). The malware downloads these images from a C2 server and then extracts and executes the hidden code. This allows the malicious content to bypass simple network-based content filters.T1546.015 - Component Object Model Hijacking: The malware establishes persistence by hijacking COM objects. It modifies registry keys associated with legitimate COM objects to point to the malicious PRISMEX DLL. When a legitimate application or the OS attempts to use the hijacked COM object, the malware is executed instead.T1102 - Web Service: The attackers abuse legitimate cloud services for C2 communication, blending their malicious traffic with normal network activity to evade detection.A successful compromise by PRISMEX would grant APT28 a persistent foothold inside highly sensitive government and military-related networks. The potential impact includes:
HKCU\Software\Classes\CLSID\Image file downloads from non-standard domains*.lnkProxy LogsDetection:
HKEY_CURRENT_USER\Software\Classes\CLSID and HKEY_CLASSES_ROOT\CLSID. This is the most reliable way to detect the persistence mechanism. D3-SFA - System File Analysis.Response:
M1051 - Update Software: Aggressively patch all systems, especially for vulnerabilities known to be used by APT28, such as the Microsoft Shortcut flaw CVE-2026-21513.M1038 - Execution Prevention: Use application control solutions to prevent the execution of unauthorized DLLs. This can directly block the malicious PRISMEX DLL from being loaded via the COM hijack.M1026 - Privileged Account Management: Enforce the principle of least privilege. The COM hijacking technique used by PRISMEX often relies on user-level registry modification, but limiting administrative privileges can prevent more damaging follow-on activity.Microsoft confirms active exploitation of CVE-2026-32202, a Windows Shell flaw, which is a bypass for CVE-2026-21510. Both are linked to APT28's exploit chain, including CVE-2026-21513.
Microsoft has confirmed active exploitation of CVE-2026-32202, a Windows Shell spoofing vulnerability, patched in April 2026. This flaw is an incomplete fix for CVE-2026-21510, which was previously weaponized by APT28 (Forest Blizzard/Fancy Bear). Crucially, CVE-2026-21510 was used by APT28 in an exploit chain alongside CVE-2026-21513, a vulnerability mentioned in the original report on the PRISMEX malware. This update highlights APT28's continued focus on Windows Shell vulnerabilities for initial access, demonstrating their agility in bypassing patches and maintaining their exploit capabilities. Organizations are urged to apply the latest Microsoft updates immediately to mitigate this actively exploited threat.
The PRISMEX campaign begins targeting Ukraine and its allies.
APT28 is observed preparing infrastructure related to CVE-2026-21509.
An exploit for CVE-2026-21513 is uploaded to VirusTotal, suggesting potential zero-day use by APT28.
Microsoft releases a patch for CVE-2026-21513.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.