Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsThis Spy Tool Has Been Quietly Stealing Data for Years
This Spy Tool Has Been Quietly Stealing Data for Years
CybersecurityDefense

This Spy Tool Has Been Quietly Stealing Data for Years

•March 10, 2026
0
Help Net Security
Help Net Security•Mar 10, 2026

Why It Matters

The campaign demonstrates Russia’s continued ability to field advanced, cloud‑based espionage tools against high‑value military targets, raising the threat level for NATO allies and underscoring the need for robust detection capabilities.

Key Takeaways

  • •Sednit uses BeardShell via Icedrive cloud C2.
  • •Covenant provides over 90 built‑in post‑exploitation tasks.
  • •Dual‑implant architecture ensures resilience against takedowns.
  • •Operations have monitored Ukrainian personnel for over six months.
  • •Tools trace back to GRU‑linked Unit 26165.

Pulse Analysis

The resurgence of Sednit highlights a strategic shift toward cloud‑centric command and control. By splitting its implants across distinct providers, the group mitigates the risk of a single point of failure, allowing continuous access even if one channel is disrupted. BeardShell’s use of Icedrive—a legitimate storage service—exemplifies how threat actors blend malicious traffic with everyday cloud activity, complicating network‑based detection and forcing defenders to scrutinize otherwise benign data flows.

Covenant, originally an open‑source post‑exploitation framework, has been heavily customized by Sednit to serve as its primary espionage implant. The modified version adds over ninety built‑in modules, enabling keystroke logging, screenshot capture, credential harvesting, and lateral movement across compromised networks. Its .NET runtime and PowerShell execution capabilities make it adaptable to a wide range of Windows environments, while the fallback BeardShell ensures persistence when Covenant’s infrastructure is compromised. This layered approach reflects a mature threat‑development lifecycle where off‑the‑shelf tools are weaponized and hardened for long‑term campaigns.

For organizations, especially those in the defense sector, the Sednit findings underscore the urgency of implementing multi‑layered security controls. Continuous monitoring of cloud service usage, anomaly‑based detection of PowerShell activity, and threat‑intel integration are essential to spot the subtle indicators of such dual‑implant operations. As Russian intelligence groups continue to refine their toolsets, the broader cybersecurity community must prioritize proactive threat hunting and rapid incident response to mitigate the risk of prolonged espionage against critical assets.

This spy tool has been quietly stealing data for years

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...