APT28, a Russian state-sponsored threat actor linked to the GRU military intelligence service, is conducting a sustained and sophisticated cyberespionage campaign against the Ukrainian military. The operation, active since at least April 2024, leverages a custom malware toolkit designed for long-term intelligence gathering and persistence. Researchers at ESET have identified several custom implants, including the BeardShell backdoor, a heavily modified version of the Covenant post-exploitation tool, and the SlimAgent keylogger. The continuous development and deployment of these advanced tools underscore APT28's role as a key instrument of Russian strategic intelligence operations, particularly in the context of the ongoing conflict in Ukraine.
This campaign is not an opportunistic attack but a deliberate, well-resourced operation aimed at gaining persistent access to sensitive military networks and communications. The use of custom malware indicates a significant investment by the threat actor to evade detection and maintain access over an extended period.
The campaign is characterized by a multi-stage infection process using a combination of custom and modified open-source tools.
BeardShell: A primary backdoor implant used for persistence and command and control (C2). It features advanced obfuscation, including the use of opaque predicates, a technique previously seen in APT28's XTunnel tool. This code-level similarity provides a strong link to the group's historical toolset.Covenant: APT28 is using a heavily customized version of the open-source .NET-based C2 framework. The modifications are likely intended to evade signatures and detection rules designed for the public version of the tool.SlimAgent: A keylogger implant believed to be an evolution of XAgent, one of APT28's legacy malware families. Its function is to capture keystrokes and other user activity for intelligence gathering.T1566.001 - Spearphishing Attachment and T1190 - Exploit Public-Facing Application.Covenant framework implies the use of T1059.001 - PowerShell and T1059.003 - Windows Command Shell.BeardShell likely establishes persistence through common techniques such as T1547.001 - Registry Run Keys / Startup Folder or T1543.003 - Windows Service.BeardShell is a clear example of T1027 - Obfuscated Files or Information. The customization of Covenant is an attempt to evade signature-based detection.T1071.001 - Web Protocols.SlimAgent keylogger directly maps to T1056.001 - Keylogging.The primary impact of this campaign is the long-term compromise of Ukrainian military systems, enabling Russian intelligence to gather strategic information. This could include troop movements, operational plans, communications, and personnel data. Such intelligence provides a significant battlefield advantage and can be used to undermine military operations. The continued evolution of APT28's toolkit demonstrates a persistent and adaptive threat that poses a direct risk to Ukrainian national security and its allies.
Defenders should focus on detecting APT28's TTPs rather than just relying on indicators for specific malware.
Covenant and other in-memory frameworks.D3-PA: Process Analysis to identify anomalous process execution chains and D3-NTA: Network Traffic Analysis to spot C2 beaconing.Covenant and its components.Filter outbound network traffic to block connections to known malicious C2 servers and untrusted domains.
Mapped D3FEND Techniques:
Use application control solutions to restrict the execution of unauthorized scripts and applications, including PowerShell in constrained language mode.
Mapped D3FEND Techniques:
Deploy and maintain endpoint security solutions capable of behavior-based detection to identify malware like BeardShell and custom Covenant loaders.
Mapped D3FEND Techniques:
Conduct regular security awareness training to help users recognize and report phishing attempts, a primary initial access vector for APT28.
To counter the threat from APT28's custom malware like BeardShell and Covenant, organizations must leverage advanced Process Analysis. This goes beyond simple signature matching. Deploy an EDR solution across all endpoints, particularly those used by high-value targets like military personnel. Configure the EDR to monitor for suspicious process ancestry; for example, an Office application spawning PowerShell, which then injects code into a legitimate process like svchost.exe. For this specific campaign, create detection rules that alert on processes loading the .NET runtime in an unusual context or PowerShell executing heavily obfuscated or encoded command blocks, which are hallmarks of Covenant. Baseline normal process behavior on military workstations and servers, and alert on deviations. This technique is crucial for detecting the in-memory execution and defense evasion tactics employed by APT28, providing a critical layer of defense where file-based scanning fails.
Implement a strict outbound traffic filtering policy at the network perimeter to disrupt APT28's command and control channels. By default, deny all outbound traffic and only allow connections to known-good, categorized domains and IPs required for legitimate business. For the Ukrainian military, this means explicitly allowing traffic to trusted partner domains and mission-critical services while blocking everything else. This approach is highly effective against malware like BeardShell and Covenant, which must call back to an attacker-controlled server. Even if the malware uses standard ports like 80/443, a URL filtering solution can block connections to uncategorized or newly registered domains, which are frequently used by APTs for C2 infrastructure. This forces the threat actor to use more established (and thus more easily tracked) infrastructure or risk having their C2 communications blocked entirely, effectively neutralizing the implant.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats