APT28's PRISMEX: Zero-Days and Hidden Payloads Assault Ukraine's Lifelines
Exactly two weeks before Microsoft patched it, APT28 had servers primed for CVE-2026-21509. This isn't random phishing—it's a precision strike on Ukraine's war machine and its allies.
⚡ Key Takeaways
- APT28 weaponized zero-days two weeks pre-disclosure, chaining CVE-2026-21509 and CVE-2026-21513 for silent execution. 𝕏
- PRISMEX hides payloads in PNGs via custom steganography, uses COM hijacking, and legitimate clouds for stealthy C2. 𝕏
- Targets Ukraine's defense logistics and NATO allies signal hybrid warfare prep—espionage today, disruption tomorrow. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by The Hacker News