Russian Hackers Use Signal to Spread New Malware Targeting Ukraine

Listen to this Post

Featured Image
Cyber War Update: A Fresh Threat Against Ukrainian Institutions

A new wave of cyberattacks tied to the Russian state has targeted Ukrainian government systems using previously unknown malware strains delivered through Signal, an encrypted messaging platform. This sophisticated breach, uncovered by the Computer Emergency Response Team of Ukraine (CERT-UA), highlights a growing threat in the ongoing digital battlefield between Russia and Ukraine.

In this latest campaign, Russian hacking group APT28—also known by aliases like Fancy Bear and Sofacy—deployed custom malware designed for stealth and persistence. What makes this breach particularly alarming is the method of delivery: malicious Office documents sent via Signal chats, exploiting trust and familiarity between contacts. These documents contained hidden macro code that silently installed malware on the target’s system.

the Attack and Malware Operation

The initial signs of compromise emerged from an investigation into a March–April 2024 breach. Two new malware families—BeardShell and SlimAgent—were discovered within a Ukrainian government organization’s network, but at the time, the infection vector was unclear.

That mystery was solved after another breach in May 2025 when attackers gained access to a gov.ua email account. CERT-UA identified that the malware entered through a Signal message. The victim had received an Office document containing macro code, which executed on opening, triggering the download and installation of BeardShell, as well as a tool from the Covenant framework, often used by advanced persistent threats (APTs).

BeardShell, written in C++, acts as a backdoor. It’s capable of downloading, decrypting, and executing PowerShell scripts, giving hackers remote control over infected machines. It even uses Icedrive’s API for file management, showcasing a highly modern and adaptive approach. For persistence, it hijacks COM components in the Windows Registry, allowing it to survive reboots.

SlimAgent, also C++-based, is a surveillance tool. It captures screenshots, encrypts them with AES and RSA encryption, and stores them locally for later exfiltration. This behavior indicates an intent to gather intelligence over an extended period.

CERT-UA confirmed that the attackers had intimate knowledge of both the target and their organization, suggesting prior reconnaissance and possible insider information. These techniques indicate a long-term espionage strategy rather than a one-time disruption.

Blame has been placed squarely on APT28, a well-documented hacking group closely linked to Russia’s GRU military intelligence agency. The group has been increasingly active, especially targeting logistics and defense organizations supporting Ukraine, as confirmed by US and allied cybersecurity authorities.

šŸ” What Undercode Say:

A Deep Dive into the

This incident reflects a critical shift in cyberwarfare tactics: the use of encrypted, non-traditional communication channels like Signal to distribute malware, bypassing conventional email-based defenses.

1. Why Signal?

Signal’s reputation for privacy and security ironically makes it an ideal tool for threat actors. By delivering malware through trusted, encrypted chats, attackers bypass spam filters and exploit the assumed trust between sender and receiver. It’s a clever and insidious method that mirrors tactics often seen in espionage operations, not just cybercrime.

2. Advanced Persistence

Both malware strains use sophisticated persistence techniques. BeardShell hijacks COM objects, which is rarely used outside of high-level attacks, and SlimAgent uses dual-layer encryption (AES and RSA)—a strong sign this isn’t a one-off attack but part of a long-term intelligence-gathering campaign.

3. Link to the Covenant Framework

Covenant, an open-source post-exploitation framework, is often used by both red teams and hackers. Its presence indicates that after the malware installation, attackers intended to extend control and deploy more payloads, pointing to a modular and scalable attack infrastructure.

4.

The attack bears hallmarks of APT28, including high-level stealth, persistence, and the targeting of government infrastructure. This group has historically been involved in geopolitical cyber-operations, from U.S. election interference to the NotPetya attack. Their focus on Ukraine’s logistical and defense networks reveals a clear intent: cripple support pipelines that deliver aid and weapons.

5. Risk to Allies

With Ukraine as the frontline, this technique could soon be replicated in NATO countries or other allied states. Government and defense agencies must treat encrypted messaging apps as potential threat vectors, applying monitoring and training to minimize risk.

6. Human Factor is Key

This attack succeeded because a trusted employee opened a malicious document sent via Signal. It reinforces the need for zero-trust policies and employee cyber hygiene training, especially in high-risk institutions.

āœ… Fact Checker Results

APT28 Involvement: āœ… Verified across multiple global cybersecurity agencies
Use of Signal as malware delivery: āœ… Confirmed in CERT-UA’s 2025 disclosure
BeardShell and SlimAgent identified: āœ… Validated via malware analysis and registry tracing

šŸ”® Prediction

Given the sophistication of this attack and its reliance on human trust and encrypted channels, we predict that APT28 and similar groups will increasingly exploit trusted platforms like Signal, WhatsApp, or even Zoom for malware delivery. Expect to see new malware variants that mask their operations through legitimate services. As war evolves, so will cyber tactics—stealth, trust abuse, and long-term espionage will dominate the threat landscape in 2025 and beyond.

References:

Reported By: www.securityweek.com
Extra Source Hub:
https://www.reddit.com/r/AskReddit
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

šŸ’¬ Whatsapp | šŸ’¬ Telegram