<ul data-eligibleForWebStory="true">UAC-0001 (APT28), a russian state-sponsored hacking group, resurfaces targeting government agencies with BEARDSHELL and COVENANT malware.CERT-UA identified unauthorized access in the gov.ua domain, revealing ongoing malicious activities by APT28.This group utilizes evolving tactics like phishing and software exploitation to target Ukrainian public sectors.Recent alerts warn of APT28 leveraging COVENANT and BEARDSHELL malware, emphasizing the need for robust cyber defense measures.Security teams can utilize SOC Prime's platform for context-enriched detection content and utilize Uncoder AI for automated threat hunting.The ongoing APT28 campaign showcases the use of malicious tools like BEARDSHELL and SLIMAGENT to target state bodies.The attack vectors include Signal messenger for payload delivery and exploitation of macro-enabled documents.Mitigation strategies involve auditing macro execution and restricting network traffic to trusted services to combat APT28 attacks.MITRE ATT&CK context provides insights into the techniques used by APT28, aiding in proactive cyber defense against their campaigns.The APT28 threat remains active, requiring continual vigilance and advanced security technologies to safeguard against sophisticated attacks.