APT28's PRISMEX Malware Targets Ukraine & NATO Supply Chains

APT28's PRISMEX Malware Targets Ukraine & NATO Supply Chains

Cyber Threat Intelligence is reporting a significant escalation in state-backed cyber operations with the emergence of PRISMEX malware, deployed by the Russian-linked APT28 group. This new campaign isnโ€™t just about espionage; itโ€™s a calculated move to disrupt critical infrastructure and logistics supporting Ukraine and NATO allies. The targets span Ukrainian government agencies, defense units, and emergency services, while also extending to the logistics and transportation sectors in Poland, Romania, Turkey, and other European nations. The primary objective appears to be weakening the supply chains vital for Ukraineโ€™s defense efforts.

Whatโ€™s particularly concerning is APT28โ€™s use of zero-day exploits, specifically referencing CVE-2026-21509 and CVE-2026-21513, before patches were available. This indicates advanced reconnaissance capabilities and likely insider knowledge or sophisticated exploit acquisition. The attack vector begins with a malicious shortcut file, which then triggers a secondary exploit designed to bypass security controls and execute the PRISMEX payload silently and without user interaction. This two-stage approach allows for swift and covert initial compromise.

PRISMEX itself employs advanced evasion techniques to remain undetected. Cyber Threat Intelligence highlights its use of steganography to embed payloads within image files, executing them directly in memory rather than writing them to disk. This in-memory execution significantly hampers traditional file-based detection methods. Furthermore, the malware establishes persistence through COM hijacking and scheduled tasks, and utilizes legitimate cloud services for command-and-control (C2) communications, making C2 traffic harder to distinguish from normal network activity.

What This Means For You

  • Given APT28's use of steganography to hide payloads within image files and execute them in memory, security teams must enhance their endpoint detection and response (EDR) capabilities to monitor for anomalous memory activity and process behavior, rather than solely relying on file-based signatures.
๐Ÿ”Ž
Stay ahead of this threat Search threats by organization, set watchlist alerts, or get a weekly SIEM digest with detection rules matched to your vendors โ€” inside Telegram.
Open Intel Bot โ†’

Related coverage

Packagist Supply Chain Attack Infects 8 Packages with Linux Malware

A new, coordinated supply chain attack has compromised eight packages on Packagist. The attack injects malicious code designed to retrieve and execute a Linux binary...

threat-intelvulnerabilitymalwaretools
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 2 Sigma

Laravel-Lang PHP Packages Compromised with Cross-Platform Credential Stealer

The Hacker News reports a significant software supply chain attack targeting multiple PHP packages under the Laravel-Lang project. Attackers compromised these packages to distribute a...

threat-intelvulnerabilitymalwareidentitytools
/SCW Vulnerability Desk /HIGH /⚑ 5 IOCs /⚙ 2 Sigma

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma