Researchers have identified a new, highly sophisticated campaign by the Russia-aligned Advanced Persistent Threat (APT) group Pawn Storm (also known as APT28 and Fancy Bear). The campaign is actively targeting government, critical infrastructure, and specifically the defense supply chain in Ukraine and allied nations. According to Trend Micro, the group is deploying a new modular malware toolkit named PRISMEX. This malware uses advanced evasion techniques, and the campaign is notable for its use of a confirmed Microsoft Windows zero-day vulnerability, CVE-2026-21513. The combination of a new malware suite and a zero-day exploit indicates a well-resourced and persistent threat focused on espionage and disruption against targets related to the war in Ukraine.
CVE-2026-21513, a previously unknown vulnerability in Microsoft Windows.PRISMEX is a sophisticated toolkit that employs multiple techniques to evade detection and maintain persistence.
CVE-2026-21513. This allows the attackers to gain a foothold on target systems by exploiting unpatched software (T1211 - Exploitation for Client Execution).T1027.003 - Steganography).T1574.002 - COM Hijacking).This campaign poses a severe threat to the national security of Ukraine and its NATO allies. By targeting the defense supply chain, Pawn Storm aims to:
CVE-2026-21513 from Microsoft.HKEY_CLASSES_ROOT\CLSID. This is a key method for detecting COM hijacking persistence, as supported by D3FEND's System Configuration Permissions (D3-SCP) hardening.M1051 - Update Software).M1038 - Execution Prevention).Applying the security update for the zero-day CVE-2026-21513 is the most critical and direct mitigation.
Mapped D3FEND Techniques:
Hardening registry permissions for known COM hijacking locations can prevent the malware from establishing persistence.
Mapped D3FEND Techniques:
Using application allowlisting can prevent the execution of the PRISMEX malware components even if they are successfully dropped on a system.
Mapped D3FEND Techniques:
Strict egress filtering can block C2 communications, even when they are directed at legitimate cloud services.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats