Pawn Storm Campaign - PRISMEX Targets Ukraine's Defense Supply Chain
Basically, a group of hackers is using new malware to attack Ukraine's defense systems.
The Pawn Storm campaign has launched new malware targeting Ukraine's defense systems. This attack exploits critical vulnerabilities, posing risks to military and humanitarian efforts. Organizations must enhance their defenses against these sophisticated threats.
The Threat
The Pawn Storm campaign, attributed to the Russia-aligned APT group known as Pawn Storm, has recently escalated its operations. This group, also referred to as APT28 or Fancy Bear, is notorious for targeting critical infrastructure and government entities. Their latest tool, named PRISMEX, combines various advanced techniques including steganography and cloud abuse to infiltrate the Ukrainian defense supply chain. This operation not only threatens Ukraine but also its allies, including countries like Poland and Romania.
The campaign has been active since at least September 2025, but it intensified significantly in January 2026. This escalation is marked by the exploitation of multiple vulnerabilities, including a confirmed zero-day vulnerability, CVE-2026-21513, which allows attackers to bypass security mechanisms in Microsoft products. The implications of these attacks are severe, as they can disrupt military operations and humanitarian efforts.
Who's Behind It
Pawn Storm has a long history of cyber espionage and aggressive tactics. This group has been linked to various high-profile attacks since 2014, primarily targeting Ukraine amid ongoing geopolitical tensions. The PRISMEX malware suite is a significant evolution in their toolkit, showcasing their ability to rapidly adapt to new vulnerabilities. The use of Covenant, an open-source command and control framework, highlights their sophisticated approach to maintaining stealth and evading detection.
The group’s infrastructure preparations indicate a strategic approach to exploiting vulnerabilities. For instance, they began registering domains for command and control servers weeks before the public disclosure of CVE-2026-21509. This advance knowledge suggests a well-coordinated effort to maximize the effectiveness of their attacks.
Tactics & Techniques
The PRISMEX malware operates through a complex attack chain that begins with spear-phishing emails targeting specific individuals. These emails often contain subject lines related to military training or humanitarian warnings, luring victims into opening malicious attachments. The primary exploit, CVE-2026-21509, allows the malware to execute without user interaction, making it particularly dangerous.
Once the malicious document is opened, it triggers the exploitation of the vulnerability, which then retrieves a malicious shortcut file from an attacker-controlled server. This file can further exploit CVE-2026-21513, enabling the execution of additional payloads without alerting the user. This two-stage exploitation process underscores the sophistication of the Pawn Storm campaign and its potential for widespread impact.
Defensive Measures
Organizations, especially those in critical sectors, must take proactive steps to defend against these types of cyber threats. Implementing robust email filtering solutions can help reduce the risk of spear-phishing attacks. Additionally, keeping software up to date and applying security patches promptly is crucial in mitigating the risks associated with known vulnerabilities.
Security teams should also monitor for indicators of compromise (IoCs) associated with the PRISMEX malware and consider employing advanced threat detection solutions. By understanding the tactics used by Pawn Storm, organizations can better prepare themselves to defend against similar future attacks.
Trend Micro Research