CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership

Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit

Dark Reading Archived Mar 16, 2026 ✓ Full text saved

After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBER RISK CYBERATTACKS & DATA BREACHES THREAT INTELLIGENCE NEWS Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools. Jai Vijayan,Contributing Writer March 10, 2026 4 Min Read SOURCE: DC STUDIO VIA SHUTTERSTOCK After years of mysteriously shunning custom malware, Russia's infamous Sednit threat group is back to using a bespoke toolkit in recent cyber espionage campaigns targeting Ukrainian cyber assets. At the toolkit's core are two implants, one of which employs techniques from a malware framework that Sednit used back in the 2010s, while the other is a heavily modified open source malware for long-term spying. A New Toolkit Researchers at ESET uncovered the malware when investigating a breach in Ukraine that happened in 2024 and involved the use of a keylogger called SlimAgent that was also based on Sednit code from more than 10 years ago. Alongside the keylogger, ESET discovered another malware implant it is tracking as BeardShell that allows the attacker to execute PowerShell commands on compromised systems while using the legitimate cloud service Icedrive for command-and-control (C2) communications. Related:Cyberattackers Don't Care About Good Causes Further investigation showed Sednit using Beardshell in concert with Covenant, a sophisticated, heavily reworked version of an open source implant supporting a range of capabilities including data exfiltration, lateral movement, and target monitoring. The malware, ESET discovered, has become Sednit's espionage tool of choice, with Beardshell acting as more of a backup in situations where a victim might discover Covenant. "The main takeaway is that Sednit has returned with renewed malware development and is once again running sophisticated cyber-espionage campaigns," says an ESET researcher, who did not want to be named.  For defenders, the key lesson is that the group now combines custom implants with legitimate cloud services for command-and-control, making their activity harder to detect through traditional network monitoring, the researcher says. "In addition, taking down their cloud infrastructure is complicated because they deploy a pair of implants in parallel, each relying on a different cloud provider." While the current targets appear to be Ukrainian military personnel, the group could broaden its focus, depending on how Russia's war in Ukraine evolves, the researcher adds. Sednit, tracked variously as Fancy Bear, APT28, Forest Blizzard, and Sofacy, is a threat actor that US authorities and others have linked to the intelligence directorate of the Russian military. The group has been active since 2004 and is associated with a long list of campaigns, the most notorious of which include attacks on the Democratic National Committee in 2016, the German Parliament in 2015, the World Anti-Doping Agency, and, more recently, multiple logistics and IT firms. Related:Why Post-Quantum Cryptography Can't Wait Like other advanced persistent threat actors, Sednit used custom implants, espionage backdoors, and specialized tools for lateral movement and data theft in many of its earlier campaigns. But starting sometime in 2019, and for reasons that vendors like ESET don't fully understand, Sednit stopped using these sophisticated tools and instead began deploying relatively simple implants via phishing emails in most of its campaigns. One possibility is that Sednit resumed its advanced malware development efforts following the Russian invasion of Ukraine. "Another is that the group never stopped developing its tools but remained discreet, only emerging from the shadows again as the war increased the demand for cyber espionage," the researcher says. "The shared code lineage with older Sednit malware suggests that the same development team has continued maintaining and evolving its toolkit over time." Intense Development Efforts? BeardShell, according to ESET, is malware that "bears the marks of intense development efforts." The company pointed to Sednit's successful integration of Icedrive for Beardshell's C2 communications as one indication of that effort. Because Icedrive does not publish a public API, the threat actor reverse-engineered the official client to replicate its communications, And when service changes disrupt the malware's access, the developers quickly release updates, indicating an active and well-resourced development team, ESET said. Related:What Orgs Can Learn From Olympics, World Cup IR Plans Covenant, meanwhile, is a custom-modified version of an open source .NET post exploitation framework that supports more than 90 functions for conducting long-term cyber espionage. ESET found Sednit developers made multiple modifications to the malware since 2023 to make it their primary malware tool. BeardShell, according to the ESET researcher, is a completely new implant, though it uses an obfuscation technique that Sednit used in Xtunnel, a network-pivoting tool from the 2010s. The malware "is essentially a PowerShell interpreter, which operators primarily used to redeploy Covenant, suggesting that Covenant is the preferred implant for day-to-day espionage operations," the researcher says. Both BeardShell and Covenant rely on new custom loading chains that are frequently updated by their developers, making detection something of a cat-and-mouse game. Their reliance on different legitimate cloud infrastructures for C2 communications also makes the malware difficult to block. "It is also worth noting that Sednit typically compromises its targets through social engineering over Signal Desktop or WhatsApp Desktop," the researcher says, "persuading them to open Trojanized Excel or Word documents. In some cases, the attackers even call their targets to increase the chances of success." About the Author Jai Vijayan Contributing Writer Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report The ROI of AI in Security Cybersecurity Forecast 2026 ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like CYBER RISK Venezuelan Oil Company Downplays Alleged US Cyberattack by Jai Vijayan, Contributing Writer DEC 16, 2025 CYBER RISK Dark Reading Confidential: Battle Space: Cyber Pros Land on the Front Lines of Protecting US Critical Infrastructure by Dark Reading Staff SEP 23, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 CYBER RISK Tariffs May Prompt Increase in Global Cyberattacks by Robert Lemos, Contributing Writer APR 09, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ APPLICATION SECURITY Microsoft Patches 83 CVEs in March Update byJai Vijayan MAR 11, 2026 4 MIN READ THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗