Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»APT28 hackers deploy customized variant of Covenant open-source tool
    Cybersecurity

    APT28 hackers deploy customized variant of Covenant open-source tool

    adminBy adminMarch 10, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    APT28 hackers deploy customized variant of Covenant open-source tool
    Share
    Facebook Twitter LinkedIn Pinterest Email

    APT28 hackers deploy customized variant of Covenant open-source tool

    The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.

    Also tracked as Fancy Bear, Forest Blizzard, Strontium, and Sednit, the APT28 hacker group is known for developing high-end implants and breaching notable entities, such as the German Parliament, multiple French organizations, government networks in Poland, and European NATO member countries.

    Researchers at cybersecurity company ESET noticed that since April 2024, the Russian group has started using in attacks two implants named BeardShell and Covenant.

    “This dual-implant approach enabled long-term surveillance of Ukrainian military personnel,” ESET notes in a report today.

    The two pieces of malware have been used recently to target central executive bodies of Ukraine in attacks that exploited the CVE-2026-21509 vulnerability in Microsoft Office via malicious DOC files.

    The researchers uncovered these malware families after discovering SlimAgent, a keylogging implant deployed in a Ukrainian government system capable of keystroke capture, clipboard collection, and screenshot capture.

    BeardShell is a modern implant that leverages the legitimate cloud storage service Icedrive for command-and-control (C2) communication. It can execute PowerShell commands in a .NET runtime environment and was used together with SlimAgent, according to a report from CERT-UA in June 2025.

    ESET found that BeardShell also uses a unique obfuscation technique previously seen in Xtunnel, a network-pivoting tool that APT28 used in the 2010s.

    In the recent attacks, the Russian threat group paired BeardShell with a heavily modified version of the open-source Covenant .NET post-exploitation framework.

    The changes they introduced include deterministic implant identifiers tied to host characteristics, modified execution flow to evade behavioral detection, and new cloud-based communication protocols.

    Since July 2025, the threat actor has used the Filen cloud provider with Covenant. Previously, the attacker used Koofr and pCloud services.

    Covenant dashboard
    Covenant dashboard
    Source: ESET

    ESET says Covenant is used as the primary implant, and BearShell serves as the fallback tool.

    “Since 2023, Sednit developers have made a number of modifications and experiments with Covenant to establish it as their primary espionage implant, keeping BeardShell mainly as a fallback in case Covenant encounters operational issues, such as the takedown of its cloud-based infrastructure.” – ESET

    ESET believes that APT28’s advanced malware development team returned to activity in 2024, giving the threat group new long-term espionage capabilities. The technical similarities with 2010-era malware indicate continuity in the threat group’s development team.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    APT28 Covenant Customized Deploy hackers opensource tool variant
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYou Can Disavow Entire TLDs Like .XYZ With Domain Directive
    Next Article How I Use My iPhone’s Focus Modes to Stop Getting Distracted at the Gym
    admin
    • Website

    Related Posts

    Armadin secures $189.9 million to counter AI-driven cyber threats

    March 10, 2026

    Cylake Raises $45 Million to Secure Organizations Barred From Cloud

    March 10, 2026

    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    March 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to Analyze & Compare Competitor Website Traffic in 2026

    March 10, 2026

    ANBERNIC reveals full spec sheet for PlayStation Vita clones

    March 10, 2026

    Armadin secures $189.9 million to counter AI-driven cyber threats

    March 10, 2026

    How I Use My iPhone’s Focus Modes to Stop Getting Distracted at the Gym

    March 10, 2026
    Categories
    • Blogging (36)
    • Cybersecurity (695)
    • Privacy & Online Earning (97)
    • SEO & Digital Marketing (432)
    • Tech Tools & Mobile / Apps (861)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to Analyze & Compare Competitor Website Traffic in 2026

    March 10, 2026

    ANBERNIC reveals full spec sheet for PlayStation Vita clones

    March 10, 2026

    Armadin secures $189.9 million to counter AI-driven cyber threats

    March 10, 2026
    Most Popular
    • How to Analyze & Compare Competitor Website Traffic in 2026
    • ANBERNIC reveals full spec sheet for PlayStation Vita clones
    • Armadin secures $189.9 million to counter AI-driven cyber threats
    • How I Use My iPhone’s Focus Modes to Stop Getting Distracted at the Gym
    • APT28 hackers deploy customized variant of Covenant open-source tool
    • You Can Disavow Entire TLDs Like .XYZ With Domain Directive
    • Bentley turns Spanish mountain into bespoke luxury with Bentayga Artenara Edition
    • Cylake Raises $45 Million to Secure Organizations Barred From Cloud
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.