A person in a hooded sweatshirt sits at a table in front of a Russian flag, with computer code overlays. The foreground has a red banner displaying the text APT28 in large white letters.

APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules

By Published On: October 21, 2025

The digital threat landscape is in constant flux, and few actors exemplify this more than state-sponsored advanced persistent threat (APT) groups. For cybersecurity professionals, staying abreast of their evolving tactics, techniques, and procedures (TTPs) isn’t just a best practice; it’s a necessity. Recently, Russia’s notorious APT28 group, also known as Fancy Bear or Strontium, has once again demonstrated its adaptability, resurfacing with a sophisticated spear-phishing campaign that leverages weaponized Office documents to deploy novel and potent malware. This resurgence, identified in mid-2025, demands immediate attention and analysis due to its use of obscure C2 channels and new custom payloads.

APT28’s Latest Campaign: A Deep Dive

APT28 has a long history of targeting governmental organizations, defense industries, and political entities with highly customized and effective attacks. Their latest campaign continues this trend, but with notable innovations in payload delivery and command-and-control (C2) infrastructure. The primary delivery mechanism for this new wave of attacks involves highly convincing spear-phishing emails containing weaponized Microsoft Office documents.

These malicious documents are not distributed through conventional email channels alone. A particularly concerning aspect of this campaign is the use of private Signal chats for distribution. This method exploits the perceived security and privacy of encrypted messaging applications, making it harder for traditional email security gateways to detect and block the initial threat vector. Once opened, these documents initiate a multi-stage infection process, deploying two distinct and powerful modules: BeardShell and Covenant’s HTTP Grunt Stager.

Introducing BeardShell: The IceDrive Backdoor

One of the primary payloads observed in this campaign is a new backdoor identified as BeardShell. Developed in C, BeardShell showcases the APT28’s continued investment in custom tooling that offers stealth and flexibility. Its standout feature is its use of IceDrive, a cloud storage service, as its command-and-control channel. This approach provides several advantages for the attackers:

  • Evasion: Leveraging legitimate cloud services for C2 traffic can help BeardShell blend in with normal network traffic, making detection by traditional security solutions more challenging.
  • Resilience: Cloud-based C2 infrastructure is often more resilient to takedowns than dedicated malicious servers, allowing for sustained communication with compromised systems.
  • Indirect Communication: IceDrive acts as an intermediary, obfuscating the direct IP addresses of the operators and making attribution more difficult.

BeardShell’s capabilities as a backdoor are typical of APT malware, likely including functionalities such as remote code execution, data exfiltration, and the ability to download and execute additional modules.

Covenant’s HTTP Grunt Stager and Koofr C2

The second significant payload deployed in this campaign is Covenant’s HTTP Grunt Stager. Covenant is an open-source .NET C2 framework, widely used by red teams and, unfortunately, increasingly adopted by malicious actors due to its robustness and feature set. The HTTP Grunt Stager is designed for initial compromise and establishing a foothold, often used to download further stages of malware.

What makes APT28’s use of this stager particularly noteworthy is its communication method: it leverages the Koofr cloud API. Similar to BeardShell’s use of IceDrive, this choice further emphasizes the group’s strategy of utilizing legitimate cloud services for malicious C2 operations. Koofr is another relatively lesser-known cloud storage provider, and its API provides a readily available, legitimate-looking channel for exfiltration and command issuance, further complicating network-based detection.

  • Legitimate Traffic Blending: API calls to legitimate cloud services are common in modern enterprise networks, allowing the Grunt Stager’s traffic to go unnoticed amidst regular activity.
  • Reduced IOCs: By using legitimate platforms, the immediate indicators of compromise (IOCs) are service-specific URLs rather than overtly malicious domains.

Remediation Actions and Proactive Defense

Given the sophisticated nature of this APT28 campaign, a multi-layered defense strategy is essential. Organizations must move beyond basic security measures and adopt proactive detection and response capabilities.

  • Enhanced Email and Messaging Security: Implement advanced threat protection across email and messaging platforms. Even for encrypted services like Signal, encourage users to verify sender identities and be extremely cautious about unexpected attachments, even from known contacts. Consider training on social engineering tactics specifically tailored to messaging apps.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions that can monitor for suspicious process execution, file modifications, and network connections, even if they leverage legitimate services. EDR tools can often detect the behavioral anomalies associated with BeardShell or Grunt Stager activities.
  • Network Traffic Analysis: Implement deep packet inspection and network traffic analysis to identify unusual connections to cloud services, especially those not typically used by the organization. Look for atypical data sizes or frequency of communication with IceDrive or Koofr APIs.
  • User Awareness Training: Continuously educate employees on spear-phishing techniques, the dangers of opening unsolicited attachments (even from seemingly legitimate sources or through private chats), and the importance of reporting suspicious activity. Highlight the use of new communication channels like private messaging apps for attack vectors.
  • Patch Management: Ensure all operating systems, applications, and particularly Microsoft Office suites, are fully patched and updated to mitigate potential vulnerabilities that could be exploited by weaponized documents. While no specific CVE has been publicly linked to the initial vector of this campaign, ensuring all systems are up to date reduces the overall attack surface.
  • Threat Intelligence Integration: Subscribe to and integrate high-quality threat intelligence feeds that provide timely updates on APT TTPs, IOCs, and emerging threats. This helps in proactive defense and fine-tuning detection rules.

Comprehensive Threat Defense Tools

Leveraging the right tools is critical for detecting and mitigating threats like those posed by APT28’s latest campaign.

Tool Name Purpose Link
Microsoft Defender for Endpoint Endpoint Detection & Response (EDR) for behavioral analysis and threat hunting. https://www.microsoft.com/en-us/security/business/microsoft-365-defender/endpoint-defender
Splunk Enterprise Security SIEM for log aggregation, correlation, and anomaly detection to identify C2 traffic. https://www.splunk.com/en_us/software/splunk-enterprise-security.html
Cloud Access Security Broker (CASB) Monitors and controls access to cloud services, identifying suspicious activity with IceDrive/Koofr. https://www.gartner.com/en/information-technology/market-research/casb-market-guide
Proofpoint / Mimecast Advanced email security gateways to detect and block spear-phishing attempts. https://www.proofpoint.com/
https://www.mimecast.com/
AhnLab EDR South Korean EDR solution for advanced threat detection and response. https://www.ahnlab.com/global/site/main.do

Conclusion

APT28’s latest campaign underscores the group’s persistent threat and evolving methodology. The use of weaponized Office documents delivered via private Signal chats, coupled with the deployment of the bespoke BeardShell backdoor through IceDrive and Covenant’s HTTP Grunt Stager via Koofr, showcases a deliberate effort to evade traditional security defenses. Organizations must prioritize robust endpoint security, comprehensive network monitoring, and continuous user education to effectively counter these advanced persistent threats. Staying informed and proactive is the only viable defense against such sophisticated adversaries.

Share this article

Leave A Comment