Researchers have identified a new, highly sophisticated campaign by the Russia-aligned Advanced Persistent Threat (APT) group Pawn Storm (also known as APT28 and Fancy Bear). The campaign is actively targeting government, critical infrastructure, and specifically the defense supply chain in Ukraine and allied nations. According to Trend Micro, the group is deploying a new modular malware toolkit named PRISMEX. This malware uses advanced evasion techniques, and the campaign is notable for its use of a confirmed Microsoft Windows zero-day vulnerability, CVE-2026-21513. The combination of a new malware suite and a zero-day exploit indicates a well-resourced and persistent threat focused on espionage and disruption against targets related to the war in Ukraine.
CVE-2026-21513, a previously unknown vulnerability in Microsoft Windows.PRISMEX is a sophisticated toolkit that employs multiple techniques to evade detection and maintain persistence.
CVE-2026-21513. This allows the attackers to gain a foothold on target systems by exploiting unpatched software (T1211 - Exploitation for Client Execution).T1027.003 - Steganography).T1574.002 - COM Hijacking).This campaign poses a severe threat to the national security of Ukraine and its NATO allies. By targeting the defense supply chain, Pawn Storm aims to:
CVE-2026-21513 from Microsoft.HKEY_CLASSES_ROOT\CLSID. This is a key method for detecting COM hijacking persistence, as supported by D3FEND's System Configuration Permissions (D3-SCP) hardening.M1051 - Update Software).M1038 - Execution Prevention).Applying the security update for the zero-day CVE-2026-21513 is the most critical and direct mitigation.
Mapped D3FEND Techniques:
Hardening registry permissions for known COM hijacking locations can prevent the malware from establishing persistence.
Mapped D3FEND Techniques:
Using application allowlisting can prevent the execution of the PRISMEX malware components even if they are successfully dropped on a system.
Mapped D3FEND Techniques:
Strict egress filtering can block C2 communications, even when they are directed at legitimate cloud services.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.