The Russian state-sponsored hacking group APT28 is deploying a sophisticated new malware suite called PRISMEX to target Ukrainian government agencies, military infrastructure, and various NATO-aligned logistics partners.
Key Points
- APT28, also known as Pawn Storm, has been active since September 2025 using spear-phishing to compromise defense, maritime, and rail logistics sectors.
- The PRISMEX malware suite utilizes advanced steganography, COM hijacking, and cloud service abuse to maintain command-and-control communications.
- Attackers are weaponizing zero-day vulnerabilities, including CVE-2026-21509 and CVE-2026-21513, to bypass security features and execute malicious payloads without user interaction.
- The campaign features a two-stage attack chain that can deploy either the MiniDoor email stealer or destructive wiper commands to erase user files.
- Infrastructure preparation for these attacks was observed as early as January 2026, weeks before the associated software vulnerabilities were publicly disclosed by Microsoft.