Ukraine’s state agencies targeted in APT28 campaign with Beardshell and Covenant malware

Ukraine’s national cybersecurity team CERT-UA has attributed a series of sophisticated cyberattacks against government institutions to UAC-0001 (more commonly known as APT28), a threat actor linked to Russian military intelligence. The incidents, which occurred between March and May 2024, involved advanced malware tools including Beardshell, Slimagent, and components of the Covenant framework.

During an investigation of a cyber incident affecting the information and communication system (ICS) of a central executive authority, CERT-UA discovered a compromised Windows-based server running malicious programs Beardshell and Slimagent.

Beardshell is a backdoor written in C++ that allows attackers to load and execute encrypted PowerShell scripts via Icedrive API. Each compromised machine is assigned a unique identifier based on its hardware profile.

Slimagent, also written in C++, is designed to take screenshots, encrypt them using AES and RSA, and store them locally. The method of initial compromise remained unclear during early investigations.

In May 2025, ESET reported unauthorized access to a government email account, prompting further response efforts. A deeper analysis showed that the Covenant framework was used alongside Beardshell.

Investigators traced the attack to a malicious document titled "Akt.doc", distributed via Signal messenger. The document contained a macro that, when activated, installed malware components through a COM-hijacking technique, setting up persistence through Windows registry manipulation.

The macro dropped a DLL named ctec.dll, which decrypted and executed shellcode from a disguised PNG file, ultimately launching the Covenant agent and later the Beardshell backdoor. This setup used legitimate services Koofr and Icedrive as communication channels.

Back to the list

Latest Posts

North Korean hackers deploy new EtherRAT malware in React2Shell attacks

The implant comes with sophisticated mix of features, including blockchain-based C2, multi-layered persistence, and a full Node.js runtime for evasion.
10 December 2025

Fortinet, Ivanti patch critical authentication and code-execution flaws

Organizations are recommended to apply fixes as soon as possible.
10 December 2025

Microsoft fixes over 50 flaws, including actively exploited zero-day

Microsoft has not disclosed details about how the flaw was used in the wild.
10 December 2025