radar

ONE Sentinel

securitySecurity/THREATS/HIGH

APT28 hackers deploy customized variant of Covenant open-source tool

sourceBleeping Computer
calendar_todayMarch 10, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

APT28 Utilizes Customized Covenant Framework for Espionage

Summary

The article discusses how the Russian state-sponsored APT28 group is leveraging a customized version of the Covenant open-source post-exploitation framework for espionage activities. This adaptation allows them to conduct long-term surveillance operations.

Key Points

  • APT28, a Russian state-sponsored threat group, is involved in the espionage activities.
  • They are using a custom variant of the Covenant framework, which is open-source.
  • The focus of these operations is long-term espionage.
  • Covenant is a post-exploitation framework, which suggests its use after initial access is gained.

Analysis

The use of a customized open-source tool by APT28 highlights the evolving tactics of state-sponsored threat actors. By modifying existing frameworks, they can evade detection and maintain persistent access to target systems. This development underscores the need for robust security measures and vigilance in monitoring network activities.

Conclusion

IT professionals should enhance their network monitoring and incident response capabilities to detect and mitigate threats from customized tools like Covenant. Regular updates and patching, along with threat intelligence sharing, are crucial in countering such sophisticated threats.