PRISMEX Malware: A New Benchmark in Steganography-Based Cyber Attacks

Summary:

A recent campaign attributed to APT28 highlights an escalation in cyber operations targeting Ukraine and NATO-aligned sectors through the deployment of the PRISMEX malware suite. The campaign leverages rapid weaponization of zero-day vulnerabilities (CVE-2026-21509 and CVE-2026-21513), combining them into a multi-stage attack chain that enables stealthy initial access, persistent footholds, and covert command-and-control.

PRISMEX introduces advanced steganography techniques to conceal payloads within image files, alongside capabilities for both intelligence gathering and destructive operations. The targeting of defense, logistics, and critical infrastructure sectors indicates a broader strategic objective to disrupt supply chains and operational coordination. This underscores the need for accelerated patching, enhanced monitoring, and advanced detection mechanisms.

Technical Description:

The campaign utilizes a multi-stage infection chain that combines CVE-2026-21509 and CVE-2026-21513 to establish initial access and execute malicious code with minimal user interaction. The first vulnerability forces the retrieval of a malicious LNK file, while the second bypasses Windows security controls to enable execution.

Initial delivery often involves spear-phishing emails containing weaponized Excel documents (PrismexSheet) embedded with VBA macros. These macros extract payloads hidden through steganography and establish persistence using COM hijacking.

The malware ecosystem includes multiple components such as PrismexDrop for environment preparation, PrismexLoader (PixyNetLoader) for reconstructing encrypted .NET payloads hidden within PNG files, and PrismexStager, a COVENANT-based implant enabling command-and-control via legitimate cloud services such as Filen.io.

The malware operates primarily in memory, leveraging scheduled tasks and DLL hijacking for persistence. It can deploy additional modules such as MiniDoor for email exfiltration or destructive payloads, enabling both espionage and system disruption. The details and technicalities of the attack campaign are discussed further

Delivery and Infection Chain:

The campaign primarily relies on targeted spear-phishing emails that impersonate legitimate operational documents such as logistics data or inventory spreadsheets. Victims are encouraged to enable macros, triggering payload execution.

In parallel, attackers exploit CVE-2026-21509 to force systems to retrieve malicious LNK files, reducing reliance on user interaction and increasing infection success rates. The Infection chain was identified as follows

  • Exploitation of CVE-2026-21509 to retrieve a malicious LNK file from attacker-controlled infrastructure
  • The LNK file exploits CVE-2026-21513 to bypass security controls and execute code
  • Execution of a weaponized Excel document containing VBA macros that extract steganographic payloads and establish persistence via COM hijacking
  • Deployment of secondary components such as PrismexDrop and PrismexLoader to prepare the environment and reconstruct hidden payloads
  • Execution of PrismexStager, enabling in-memory command-and-control, data exfiltration, and delivery of additional payloads including espionage tools or wipers

Technical Capabilities:

PRISMEX demonstrates advanced evasion, persistence, and modular attack capabilities. A key feature is the use of steganography to conceal malicious payloads within image files, which are later reconstructed in memory using specialized extraction algorithms. This significantly reduces on-disk artifacts and evades traditional detection mechanisms.

Persistence is maintained through COM hijacking, DLL sideloading, and scheduled task execution, ensuring long-term access across system reboots. The malware leverages legitimate cloud platforms such as Filen.io for command-and-control, blending malicious traffic with normal network activity.

The modular architecture supports multiple post-exploitation capabilities including credential harvesting, email exfiltration, system reconnaissance, and lateral movement. Integration with the COVENANT framework enables flexible tasking and supports destructive operations such as file wiping, allowing attackers to transition between espionage and disruption objectives

Attribution and Evolution:

The activity is attributed to APT28, a state-aligned threat actor known for advanced cyber operations. The campaign builds on previously observed tools such as MiniDoor while integrating modern frameworks like COVENANT for enhanced post-exploitation capabilities.

The rapid weaponization of zero-day vulnerabilities prior to public disclosure suggests access to advanced research capabilities or privileged intelligence, indicating a shift toward more proactive and strategically aligned cyber operations.

Active Campaign and Geographic Spread:

The campaign has been active since at least September 2025 and targets a wide range of sectors across multiple regions. Primary targets include Ukrainian government entities, defense organizations, emergency services, and infrastructure-related agencies.

Secondary targeting extends to NATO-aligned countries including Poland, Romania, Slovenia, Turkey, Slovakia, and the Czech Republic, with a focus on logistics, transportation, and supply chain networks. This broad geographic scope reflects coordinated intelligence collection and disruption efforts across allied ecosystems.

Conclusion:

The PRISMEX campaign represents a significant advancement in cyber threat capabilities, combining zero-day exploitation, steganography, and cloud-based command-and-control into a cohesive and highly adaptable attack framework.

The dual-use nature of the malware, supporting both intelligence collection and destructive actions, highlights the increasing convergence of espionage and disruption strategies. Organizations must strengthen detection, improve resilience, and adopt proactive defence measures to counter such evolving threats.

Impact:

The campaign poses substantial risks to confidentiality, integrity, and availability. Organizations may experience sensitive data exfiltration, including defence and logistical intelligence, as well as operational disruption through destructive payloads.

The targeting of supply chains and critical infrastructure amplifies the broader geopolitical impact, potentially affecting coordination, delaying operations, and weakening response capabilities across allied networks.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Defense Evasion, Command and Control, Exfiltration, Impact
Technique Name Spear-phishing Attachment, Exploitation of Public-Facing Application, Command and Scripting Interpreter, Hijack Execution Flow, Steganography-based Payload Delivery
Sub Technique Name Malicious Excel Macros (VBA), LNK File Exploitation, COM Hijacking, DLL Sideloading, Scheduled Task Persistence, In-Memory Execution
Attack Type Malware
Targeted Applications Microsoft Excel, Windows LNK handling, Microsoft Outlook
Region Impacted Ukraine and NATO-aligned countries
Industry Impacted Government, Defense, Logistics & Supply Chain, Transportation, Maritime, Emergency Services, Hydrometeorology
IOC’s SHA-256 Hash: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... (truncated for readability)

Domains:
dbca10b5-63e0-42ec-ad10-de13be96dc42[.]dnshook[.]site
%username%dbca10b5-63e0-42ec-ad10-de13be96dc42[.]dnshook[.]site
%username%[.]910cf351-a05d-4f67-ab8e-6f62cfa8e26d[.]dnshook[.]site
filen[.]io
freefoodaid[.]com
longsauce[.]com
wellnesscaremed[.]com
wellnessmedcare[.]org

IP Addresses:
193.187.148.169
23.227.202.14
72.62.185.31

URLs:
hxxp://webhook[.]site/910cf351-a05d-4f67-ab8e-6f62cfa8e26d?$env:USERNAME
hxxps://3008[.]filemail[.]com/api/file/get?filekey=...
hxxps://gateway[.]filen[.]io
hxxps://ingest[.]filen[.]net
... (truncated for readability)
CVE CVE-2026-21509, CVE-2026-21513

Recommended Actions:

  • Apply immediate patches for CVE-2026-21509 and CVE-2026-21513 across all systems
  • Enforce strict email security controls, including macro blocking and attachment sandboxing
  • Restrict execution of LNK files and enforce application control policies
  • Monitor for abnormal COM object activity, DLL sideloading, and scheduled task creation
  • Deploy EDR solutions with in-memory detection capabilities
  • Restrict and monitor outbound traffic to unauthorized cloud storage services
  • Conduct threat hunting for steganography-based payload patterns in image and document files
  • Provide targeted awareness training for users handling sensitive operational data

Reference:

https://www.trendmicro.com/en_us/research/26/c/pawn-storm-targets-govt-infra.html