Nation-State Threats

APT28 PRISMEX Malware Hits Ukraine NATO

Picture a Polish rail dispatcher staring at blank screens as Russian malware erases critical logs. That's PRISMEX in action, courtesy of APT28—not just spying, but sabotaging Ukraine's war machine.

Diagram of APT28 PRISMEX malware infection chain targeting Ukraine logistics

Key Takeaways

  • APT28's PRISMEX uses steganography and zero-days to target Ukraine-NATO logistics, blending espionage with sabotage.
  • Rapid exploitation of CVEs like 2026-21509/21513 shows insider-like vuln knowledge.
  • Wiper capabilities signal escalation from spying to operational disruption.

Your morning commute in Warsaw grinds to a halt. Or a Ukrainian emergency team can’t access weather data during a missile barrage. That’s the human cost of APT28’s latest trick: PRISMEX malware, slipping into the arteries of Ukraine and NATO support networks.

Look, this isn’t some abstract cyber skirmish. It’s Russian state hackers—APT28, if you’re scoring scorecards—weaponizing zero-days faster than Microsoft can patch, embedding payloads in innocent-looking PNGs, and turning cloud drives into backdoors. Real people in rail yards, weather stations, and ammo depots feel it first: systems go dark, data vanishes, ops stall.

How PRISMEX Hides in Plain Pixel Sight?

Steganography. Yeah, that old-school art of hiding messages in images—now supercharged. PRISMEXLoader (call it PixyNetLoader) slices malware across a PNG’s bit planes, round-robin style, then reassembles it in memory. No disk traces. No antivirus flags. It’s like smuggling diamonds in a cereal box, but for code.

PrismexSheet drops via malicious Excel—VBA macros tease out the hidden bits, hijack COM objects for persistence, then flash a fake drone inventory doc to lull you. “Enable macros? Sure, looks legit.” Boom, persistence locked.

And the chain? Starts with CVE-2026-21509 tricking your box into grabbing a booby-trapped LNK, which then exploits CVE-2026-21513 to dodge defenses. Akamai clocked the LNK on VirusTotal January 30, 2026—two weeks before Microsoft’s fix. APT28 knew. They always seem to.

“PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro researchers Feike Hacquebord and Hiroyuki Kakara said in a technical report.

That’s the quote that nails it. But here’s my dig: Trend Micro’s polite. This screams pre-disclosure intel sharing—or outright Microsoft moles. Remember SolarWinds? APT29 feasted on supply chains. APT28’s now chaining zero-days like that, but with a destructive twist.

Why Target Rail, Weather, and Ammo Routes Now?

Ukraine’s fighting a meat-grinder war. Logistics win it. Disrupt Polish rails (check), Romanian ports (yep), Slovak ammo flows (nailed it)—and suddenly, shells don’t reach the front. Hydrometeorology? Missiles incoming; no wind data means blind spots for air defenses.

APT28’s not subtle. They’ve looped in MiniDoor (Outlook stealer) or full PRISMEX suite, plus COVENANT Grunt C2 via Filen.io. CERT-UA flagged COVENANT back in June 2025; now PrismexStager expands it, with wipers that nuke your user profile. Espionage today, sabotage tomorrow.

Zscaler called part of this Operation Neusploit. Overlaps like wellnesscaremed[.]com domain tie the CVEs. It’s a two-stage tango: fetch LNK, exploit, drop hell.

But—pause—this feels like a page from Stuxnet’s playbook. 2010, Iran: cyber worms wrecked centrifuges without a shot. PRISMEX? Hybrid precursor. Steal plans, then wipe ops. My prediction: by summer 2026, we see physical hits synced to these digital gut-punches. Russia’s testing NATO’s soft underbelly.

PrismexDrop preps the beachhead—scheduled tasks, more COM DLL tricks. Then Loader unpacks .NET from images. Stager phones home via abused cloud. Elegant. Evil.

Trend Micro cuts deep: “This operation demonstrates that Pawn Storm remains one of the most aggressive Russia-aligned intrusion sets.” Aggressive? It’s surgical warfare on supply chains.

Who’s Really Exposed Here?

Not just Ukraine’s central bodies or emergency crews. NATO allies in the crosshairs: Poland’s rails, Slovenia/Turkey shipping, Czech/Slovak logistics. Started September 2025; infra prepped January 12, 2026. Timing’s no accident—pre-Patch Tuesday perfection.

Corporate spin? Microsoft’s patching’s reactive. “Zero-day” my foot; APT28 had the exploits primed. And open-source COVENANT? Deniability gold—looks like script kiddies, hits like FSB.

Here’s the unique angle you won’t find in Trend’s report: this mirrors KGB’s Cold War “active measures.” Back then, forged docs sowed chaos. Now, stego-malware erases truths. Architectural shift? From blunt DDoS to pixel-precision disruption. Defenses must evolve—scan images bit-plane deep, audit COM like hawks.

One punchy truth: if you’re in logistics or defense adjacencies, audit LNKs yesterday.

The wiper in October 2025? Erased %USERPROFILE%. Dual-use: spy, then scorch. Hypothesis holds—espionage to sabotage pipeline.

“The strategic focus on targeting the supply chains, weather services, and humanitarian corridors supporting Ukraine represents a shift toward operational disruption that may presage more destructive activities.”

Shift? Understatement. It’s the new normal.


🧬 Related Insights

Frequently Asked Questions

What is PRISMEX malware?

PRISMEX is APT28’s modular suite using steganography in images, COM hijacking, and cloud C2 to persist and exfiltrate from Windows targets.

Who does APT28 target with PRISMEX?

Ukraine’s defense, emergency services, weather ops, plus NATO allies’ rail, maritime, and ammo logistics.

How does PRISMEX exploit zero-days?

Chains CVE-2026-21509 (LNK fetch) with CVE-2026-21513 (bypass) for silent payload drops—weaponized before patches.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What is <a href="/tag/prismex-malware/">PRISMEX malware</a>?
PRISMEX is APT28's modular suite using steganography in images, COM hijacking, and cloud C2 to persist and exfiltrate from Windows targets.
Who does APT28 target with PRISMEX?
Ukraine's defense, emergency services, weather ops, plus NATO allies' rail, maritime, and ammo logistics.
How does PRISMEX exploit zero-days?
Chains CVE-2026-21509 (LNK fetch) with CVE-2026-21513 (bypass) for silent payload drops—weaponized before patches.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.