Russian APT28 Targets NATO and Ukraine With PRISMEX Malware

Dominic Jainy has spent years at the intersection of emerging technology and high-stakes security, specializing in the complex ways artificial intelligence and blockchain intersect with modern threat landscapes. As an expert who has tracked the evolution of sophisticated intrusion sets, he offers a unique perspective on the shifting tactics of groups like Forest Blizzard. Our conversation explores the tactical mechanics of the PRISMEX malware suite, focusing on the blend of steganography and cloud service abuse used to target critical infrastructure. We also delve into the strategic pivot from data theft to active sabotage within Eastern European logistics networks and how organizations can fortify their defenses against such aggressive state-sponsored campaigns.

When threat actors weaponize vulnerabilities like CVE-2026-21509 weeks before public disclosure, what internal red flags should security teams look for? How can organizations shift from reactive patching to proactive defense when facing zero-day chains designed to bypass standard user warnings?

The most alarming red flag is the preparation of infrastructure, such as the registration of domains like “wellnesscaremed[.]com,” which occurred on January 12, 2026, a full two weeks before the vulnerability was even public. Security teams must monitor for unusual outbound connections to newly registered domains or specific Microsoft Shortcut (LNK) file behaviors that deviate from the norm. To move toward a proactive stance, organizations need to implement advanced behavioral analytics that can spot the exploitation of CVE-2026-21513, which is used to bypass security features without triggering a single user warning. Instead of waiting for a patch, which in some cases didn’t arrive until February 10, teams should use “attack surface management” to identify and shield the specific system components that these zero-day chains target. By analyzing the timing of these exploits—some of which were uploaded to VirusTotal as early as January 30—we can see that the attackers are often several steps ahead of the official disclosure cycle.

The PRISMEX suite utilizes steganography in image files and COM hijacking for persistence. What specific forensic artifacts do these techniques leave behind, and how should incident responders adjust their scanning tools to detect payloads hidden within legitimate cloud service traffic like Filen.io?

When dealing with PRISMEX, forensic investigators should look for the “SplashScreen.png” file, which serves as a container for the .NET payload hidden through a “Bit Plane Round Robin” algorithm. This type of steganography is designed to look like a standard image file, so defenders need tools that perform deep-file inspection rather than just checking file extensions. In terms of persistence, the use of COM DLL hijacking leaves distinct traces in the Windows Registry and scheduled tasks that point to unauthorized or non-standard library loads. For cloud-based command-and-control, the abuse of Filen.io is particularly tricky because it masquerades as legitimate encrypted storage traffic. Responders should adjust their network monitoring to flag high-entropy traffic or persistent HTTPS connections to cloud storage providers that are not part of the organization’s approved software stack.

Recent campaigns have shifted focus toward rail logistics and ammunition supply chains across Eastern Europe. What are the unique cybersecurity challenges in protecting these cross-border logistical networks, and how can stakeholders better coordinate their threat intelligence to prevent operational disruptions?

The primary challenge lies in the geographical and technical fragmentation of networks across countries like Poland, Romania, Slovakia, and the Czech Republic. These rail and maritime logistics hubs are the backbone of humanitarian and military corridors, making them high-value targets for operational disruption rather than just simple spying. Stakeholders often struggle with disparate security standards, which is why a unified intelligence-sharing framework is vital to track movements like those observed since September 2025. By sharing indicators of compromise early—such as the specific VBA macros used in PrismexSheet that reference drone inventory lists—partners can create a collective shield. Coordinating these efforts allows for a faster response when threat actors attempt to bridge the gap between digital intrusion and physical logistical delays.

Some recent intrusions involve tools that can both gather intelligence and execute destructive wiper commands. How should a defense strategy change when a group’s intent pivots from data theft to total system erasure, and what recovery protocols are most effective against profile-level file destruction?

The discovery of a COVENANT Grunt payload in October 2025 that could execute a wiper command to erase everything under the “%USERPROFILE%” directory marks a terrifying shift in intent. A defense strategy must transition from protecting data confidentiality to ensuring “system resilience” and “availability” through immutable, off-site backups. Traditional recovery protocols are often too slow, so organizations need to implement automated restoration processes that can rebuild user profiles from a known-good state within minutes. Because these wiper commands can be triggered instantly after a period of quiet espionage, the “Zero Trust” model becomes essential, where no process is granted the permission to perform mass deletions without secondary authentication. This dual-threat environment requires a mindset where every breach is treated not just as a leak, but as a potential precursor to a total system blackout.

What is your forecast for PRISMEX and similar state-sponsored campaigns?

I expect that we will see a much more aggressive integration of “living-off-the-cloud” techniques, where actors like Forest Blizzard rely almost exclusively on legitimate services to bypass traditional perimeter defenses. The evolution from MiniDoor and NotDoor into the more complex PRISMEX suite suggests that these actors are investing heavily in modular malware that can be swapped out depending on whether the mission is intelligence gathering or sabotage. As we move further into 2026, the window between a vulnerability being discovered and it being weaponized will likely shrink even further, perhaps to just a few days or hours. We are entering an era where the supply chain—from weather services to ammunition manufacturers—will be under constant, high-pressure reconnaissance. My forecast is that these campaigns will increasingly target the “interstitial spaces” of international logistics, where the handoff of data between different national entities creates a momentary vulnerability that attackers are now perfectly positioned to exploit.

Explore more

What Guardrails Make AI Safe for UK HR Decisions?

Lead: The Moment a Black Box Decides Pay and Potential A single unseen line of code can tilt a shortlist, nudge a rating, and quietly reroute a career overnight, while no one in the room can say exactly why the machine chose that path. Picture a candidate rejected by an algorithm later winning an unfair discrimination claim; the tribunal asks

Is AI Fueling Skillfishing, and How Can Hiring Fight Back?

The Hook: A Resume That Worked Too Well Lights blink on dashboards, projects stall, and the new hire with the flawless resume misses the mark before week two reveals the gap between performance theater and real work. The manager rereads the portfolio and wonders how the interview panel missed the warning signs, while the team quietly picks up the slack

Choose the Best E-Commerce Analytics Tools for 2026

Headline: Signals to Strategy—How Unified Analytics, Behavior Insight, and Discovery Engines Realign Retail Growth The Setup: Why Analytics Choices Decide Growth Now Budgets are sprinting ahead of confidence as acquisition costs climb, margins compress, and shoppers glide between marketplaces and storefronts faster than teams can reconcile the numbers that explain why performance shifted and where money should move next. The

Can One QR Code Connect Central Asia to Global Payments?

Lead A single black-and-white square at a market stall in Almaty now hints at a borderless checkout, where a traveler’s scan can settle tabs from Silk Road bazaars to Shanghai boutiques without a second thought.Street vendors wave customers forward, hotel clerks lean on speed, and tourists expect the same tap-and-go ease they know at home—only now the bridge runs through

AI Detection in 2026: Tools, Metrics, and Human Checks

Introduction Seemingly flawless emails, essays, and research reports glide across desks polished to a mirror sheen by unseen algorithms that stitch sources, tidy syntax, and mimic cadence so persuasively that even confident readers second-guess their instincts and reach for proof beyond gut feeling. That uncertainty is not a mere curiosity; it touches grading standards, editorial due diligence, grant fairness, and