{"id":45450,"date":"2026-04-16T06:18:28","date_gmt":"2026-04-15T22:18:28","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals\/"},"modified":"2026-04-16T06:18:28","modified_gmt":"2026-04-15T22:18:28","slug":"new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals\/","title":{"rendered":"New AgingFly malware used in attacks on Ukraine govt, hospitals"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"838\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2022\/03\/15\/Ukraine-hacker.jpg\" width=\"1600\" alt=\"New AgingFly malware used in attacks on Ukraine govt, hospitals\"><\/p>\n<p>A new malware family named &lsquo;AgingFly&rsquo; has been identified in attacks against local governments and hospitals that steal authentication data from Chromium-based browsers and WhatsApp messenger.<\/p>\n<p>The attacks were spotted in Ukraine by the country&#8217;s CERT team last month. Based on the forensic evidence, targets may also include representatives of&nbsp;the Defense Forces.<\/p>\n<p>CERT-UA has attributed the attacks to a cyber threat cluster it tracks as UAC-0247.<\/p>\n<h3>Attack chain<\/h3>\n<p>According to the Ukrainian agency, the attack begins with the target receiving an email purporting to be a humanitarian aid offer, which encourages&nbsp;them to click an embedded link.<\/p>\n<p>The link redirects to a legitimate site that had been compromised via a cross-site scripting (XSS) vulnerability, or to a fake site generated using an AI tool.<\/p>\n<p>CERT-UA says that the target receives an archive with a shortcut file (LNK) that launches a built-in HTA handler, which in turn connects to a remote resource to retrieve and execute the HTA file.<\/p>\n<p>The HTA displays a decoy form to divert attention and creates a scheduled task that downloads and runs an EXE payload that injects shellcode into a legitimate process.<\/p>\n<p>Next, the attackers deploy a two-stage loader in which the second stage uses a custom executable format, and the final payload is compressed and encrypted.<\/p>\n<p>&#8220;A typical TCP reverse shell or an analogue classified as RAVENSHELL can be used as stagers, which provides for establishing a TCP connection with the management server,&#8221; CERT-UA says in a <a href=\"https:\/\/cert.gov.ua\/article\/6288271\" rel=\"nofollow noopener\">report<\/a> today.<\/p>\n<p>A TCP connection encrypted using the XOR cipher is established to the C2 server for executing commands via the Command Prompt in Windows.<\/p>\n<p>In the next stage, the AgingFly malware is delivered and deployed. At the same time, a PowerShell script (SILENTLOOP) is used to execute commands, update the configuration, and retrieve the C2 server address from a Telegram channel or fallback mechanisms.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/chain.jpg\" width=\"795\" alt=\"New AgingFly malware used in attacks on Ukraine govt, hospitals\"><figcaption><strong>The attack chain<\/strong><br \/><em>Source: CERT-UA<\/em><\/figcaption><\/figure>\n<\/div>\n<p>After investigating a dozen such incidents, the researchers determined that the attacker is stealing browser data using the&nbsp;open-source security tool ChromElevator that can decrypt and extract sensitive information, like cookies and&nbsp;saved passwords, from Chromium-based browsers (e.g., Google Chrome, Edge, Brave) without needing administrator privileges.<\/p>\n<p>The threat actor also tries to extract sensitive data from the WhatsApp application for Windows by decrypting databases using the ZAPiDESK open-source forensic tool.<\/p>\n<p>According to the researchers, the actor engages in reconnaissance activity and tries to move laterally on the network, and uses publicly available utilities, like the&nbsp;RustScan port scanner, the&nbsp;Ligolo-ng and Chisel tunneling tools.&nbsp;<\/p>\n<h3>Compiling source code on the host<\/h3>\n<p>AgingFly is a C# malware that provides its operators with remote control, command execution, file exfiltration, screenshot capture, keylogging, and arbitrary code execution.<\/p>\n<p>It communicates with its C2 server via WebSockets and encrypts the traffic using AES-CBC with a static key.<\/p>\n<p>The researchers note that a particularity of the AgingFly malware is that it does not include pre-built command handlers; instead, it compiles them on the host from source code received from the C2 server.<\/p>\n<p>&ldquo;A distinguishing feature of AGINGFLY compared to similar malware is the absence of built-in command handlers in its code. Instead, they are retrieved from the C2 server as source code and dynamically compiled at runtime,&rdquo; <a href=\"https:\/\/cert.gov.ua\/article\/6288271\" rel=\"nofollow noopener\">CERT-UA explains<\/a>.<\/p>\n<p>The benefits of this approach include a smaller initial payload, the ability to change or extend capabilities on demand, and the potential to evade static detection.<\/p>\n<p>However, this unusual approach adds complexity, relies on C2 connectivity, a larger runtime footprint, and ultimately increases detection risk.<\/p>\n<p>CERT-UA recommends that users block the launch of LNK, HTA, and JS files to disrupt the attack chain used in this campaign.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"New AgingFly malware used in attacks on Ukraine govt, hospitals\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool\/\">APT28 hackers deploy customized variant of Covenant open-source tool<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites\/\">WordPress plugin suite hacked to push malware to thousands of sites<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/signed-software-abused-to-deploy-antivirus-killing-scripts\/\">Signed software abused to deploy antivirus-killing scripts<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities\/\">New &lsquo;LucidRook&rsquo; malware used in targeted attacks on NGOs, universities<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack\/\">New macOS stealer campaign uses Script Editor in ClickFix attack<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new malware family named &lsquo;AgingFly&rsquo; has b [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45450","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45450"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45450\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}