Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit
Dark ReadingArchived Mar 16, 2026✓ Full text saved
After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBER RISK
CYBERATTACKS & DATA BREACHES
THREAT INTELLIGENCE
NEWS
Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit
After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.
Jai Vijayan,Contributing Writer
March 10, 2026
4 Min Read
SOURCE: DC STUDIO VIA SHUTTERSTOCK
After years of mysteriously shunning custom malware, Russia's infamous Sednit threat group is back to using a bespoke toolkit in recent cyber espionage campaigns targeting Ukrainian cyber assets.
At the toolkit's core are two implants, one of which employs techniques from a malware framework that Sednit used back in the 2010s, while the other is a heavily modified open source malware for long-term spying.
A New Toolkit
Researchers at ESET uncovered the malware when investigating a breach in Ukraine that happened in 2024 and involved the use of a keylogger called SlimAgent that was also based on Sednit code from more than 10 years ago. Alongside the keylogger, ESET discovered another malware implant it is tracking as BeardShell that allows the attacker to execute PowerShell commands on compromised systems while using the legitimate cloud service Icedrive for command-and-control (C2) communications.
Related:Cyberattackers Don't Care About Good Causes
Further investigation showed Sednit using Beardshell in concert with Covenant, a sophisticated, heavily reworked version of an open source implant supporting a range of capabilities including data exfiltration, lateral movement, and target monitoring. The malware, ESET discovered, has become Sednit's espionage tool of choice, with Beardshell acting as more of a backup in situations where a victim might discover Covenant.
"The main takeaway is that Sednit has returned with renewed malware development and is once again running sophisticated cyber-espionage campaigns," says an ESET researcher, who did not want to be named.
For defenders, the key lesson is that the group now combines custom implants with legitimate cloud services for command-and-control, making their activity harder to detect through traditional network monitoring, the researcher says. "In addition, taking down their cloud infrastructure is complicated because they deploy a pair of implants in parallel, each relying on a different cloud provider." While the current targets appear to be Ukrainian military personnel, the group could broaden its focus, depending on how Russia's war in Ukraine evolves, the researcher adds.
Sednit, tracked variously as Fancy Bear, APT28, Forest Blizzard, and Sofacy, is a threat actor that US authorities and others have linked to the intelligence directorate of the Russian military. The group has been active since 2004 and is associated with a long list of campaigns, the most notorious of which include attacks on the Democratic National Committee in 2016, the German Parliament in 2015, the World Anti-Doping Agency, and, more recently, multiple logistics and IT firms.
Related:Why Post-Quantum Cryptography Can't Wait
Like other advanced persistent threat actors, Sednit used custom implants, espionage backdoors, and specialized tools for lateral movement and data theft in many of its earlier campaigns. But starting sometime in 2019, and for reasons that vendors like ESET don't fully understand, Sednit stopped using these sophisticated tools and instead began deploying relatively simple implants via phishing emails in most of its campaigns.
One possibility is that Sednit resumed its advanced malware development efforts following the Russian invasion of Ukraine. "Another is that the group never stopped developing its tools but remained discreet, only emerging from the shadows again as the war increased the demand for cyber espionage," the researcher says. "The shared code lineage with older Sednit malware suggests that the same development team has continued maintaining and evolving its toolkit over time."
Intense Development Efforts?
BeardShell, according to ESET, is malware that "bears the marks of intense development efforts." The company pointed to Sednit's successful integration of Icedrive for Beardshell's C2 communications as one indication of that effort. Because Icedrive does not publish a public API, the threat actor reverse-engineered the official client to replicate its communications, And when service changes disrupt the malware's access, the developers quickly release updates, indicating an active and well-resourced development team, ESET said.
Related:What Orgs Can Learn From Olympics, World Cup IR Plans
Covenant, meanwhile, is a custom-modified version of an open source .NET post exploitation framework that supports more than 90 functions for conducting long-term cyber espionage. ESET found Sednit developers made multiple modifications to the malware since 2023 to make it their primary malware tool.
BeardShell, according to the ESET researcher, is a completely new implant, though it uses an obfuscation technique that Sednit used in Xtunnel, a network-pivoting tool from the 2010s. The malware "is essentially a PowerShell interpreter, which operators primarily used to redeploy Covenant, suggesting that Covenant is the preferred implant for day-to-day espionage operations," the researcher says.
Both BeardShell and Covenant rely on new custom loading chains that are frequently updated by their developers, making detection something of a cat-and-mouse game. Their reliance on different legitimate cloud infrastructures for C2 communications also makes the malware difficult to block. "It is also worth noting that Sednit typically compromises its targets through social engineering over Signal Desktop or WhatsApp Desktop," the researcher says, "persuading them to open Trojanized Excel or Word documents. In some cases, the attackers even call their targets to increase the chances of success."
About the Author
Jai Vijayan
Contributing Writer
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.
More Insights
Industry Reports
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
The ROI of AI in Security
Cybersecurity Forecast 2026
ThreatLabz 2025 Ransomware Report
Access More Research
Webinars
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
AI-Powered Threat Detection: Beyond Traditional Security Models
More Webinars
You May Also Like
CYBER RISK
Venezuelan Oil Company Downplays Alleged US Cyberattack
by Jai Vijayan, Contributing Writer
DEC 16, 2025
CYBER RISK
Dark Reading Confidential: Battle Space: Cyber Pros Land on the Front Lines of Protecting US Critical Infrastructure
by Dark Reading Staff
SEP 23, 2025
CYBERATTACKS & DATA BREACHES
DeepSeek Breach Opens Floodgates to Dark Web
by Emma Zaballos
APR 22, 2025
CYBER RISK
Tariffs May Prompt Increase in Global Cyberattacks
by Robert Lemos, Contributing Writer
APR 09, 2025
Editor's Choice
CYBERSECURITY OPERATIONS
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
byJai Vijayan
MAR 12, 2026
5 MIN READ
APPLICATION SECURITY
Microsoft Patches 83 CVEs in March Update
byJai Vijayan
MAR 11, 2026
4 MIN READ
THREAT INTELLIGENCE
Commercial Spyware Opponents Fear US Policy Shifting
byRob Wright
MAR 12, 2026
9 MIN READ
Want more Dark Reading stories in your Google search results?
2026 Security Trends & Outlooks
THREAT INTELLIGENCE
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
JAN 2, 2026
CYBER RISK
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
JAN 12, 2026
ENDPOINT SECURITY
CISOs Face a Tighter Insurance Market in 2026
JAN 5, 2026
THREAT INTELLIGENCE
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
JAN 30, 2026
Download the Collection
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
SUBSCRIBE
Webinars
Building a Robust SOC in a Post-AI World
THURS, MARCH 19, 2026 AT 1PM EST
Retail Security: Protecting Customer Data and Payment Systems
THURS, APRIL 2, 2026 AT 1PM EST
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
WED, APRIL 1, 2026 AT 1PM EST
Securing Remote and Hybrid Work Forecast: Beyond the VPN
TUES, MARCH 10, 2026 AT 1PM EST
AI-Powered Threat Detection: Beyond Traditional Security Models
WED, MARCH 25, 2026 AT 1PM EST
More Webinars
White Papers
Autonomous Pentesting at Machine Speed, Without False Positives
Fixing Organizations' Identity Security Posture
Best practices for incident response planning
Industry Report: AI, SOC, and Modernizing Cybersecurity
The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks.
Explore More White Papers
GISEC GLOBAL 2026
GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills.
📌 BOOK YOUR SPACE