{"id":45477,"date":"2026-04-16T18:36:46","date_gmt":"2026-04-16T10:36:46","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign\/"},"modified":"2026-04-16T18:36:46","modified_gmt":"2026-04-16T10:36:46","slug":"uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign\/","title":{"rendered":"UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c\/s1600\/uk.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c\/s1600\/uk.jpg\" alt=\"UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign\"\/><\/a><\/div>\n<p>The Computer Emergencies Response Team of Ukraine (CERT-UA)&nbsp;has <a href=\"https:\/\/cert.gov.ua\/article\/6288271\">disclosed<\/a> details of a new&nbsp;campaign that has&nbsp;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&nbsp;WhatsApp.<\/p>\n<p>The activity,&nbsp;which was&nbsp;observed between March and April 2026, has been attributed to a threat cluster&nbsp;dubbed <strong>UAC-0247<\/strong>. The&nbsp;origins of the campaign are presently&nbsp;unknown.<\/p>\n<p>According to CERT-UA, the starting point of the attack chain is an email message claiming to be a humanitarian aid proposal, urging recipients to click on a link that redirects to either a legitimate website compromised via a cross-site scripting (XSS) vulnerability or a bogus site created with help from artificial intelligence (AI)&nbsp;tools.<\/p>\n<p>Regardless&nbsp;of what the&nbsp;site is, the goal is to download and run a Windows Shortcut (LNK) file, which then executes a remote HTML Application (HTA) using the native Windows&nbsp;utility, &#8220;mshta.exe.&#8221;The HTA file, for its part, displays a decoy form to divert the victim&#8217;s&nbsp;attention, while simultaneously fetching a&nbsp;binary responsible for&nbsp;injecting shellcode into a legitimate process (e.g., &#8220;runtimeBroker.exe&#8221;).<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>&#8220;At the same time, recent campaigns have recorded the use of a two-stage loader, the second stage of&nbsp;which is implemented using a proprietary executable file format (with full support for code and data sections, import of functions from dynamic libraries, and relocation), and the final payload is additionally compressed and encrypted,&#8221; CERT-UA&nbsp;said.<\/p>\n<p>One of the stagers is a tool called TCP reverse shell or its equivalent, tracked as RAVENSHELL, which establishes a TCP connection with a management server to receive&nbsp;commands for&nbsp;execution on the host using &#8220;cmd.exe.&#8221;<\/p>\n<p>Also downloaded to the infected machine is a malware family dubbed AGINGFLY and a PowerShell script referred to as SILENTLOOP that comes with several functions to execute commands, auto-update configuration, and obtain the current IP address of the management server from a Telegram channel, and fall back to alternative mechanisms for determining the command-and-control (C2)&nbsp;address.<\/p>\n<p>Developed using C#,&nbsp;AGINGFLY is engineered to provide remote control of the affected systems. It&nbsp;communicates with a C2 server using WebSockets to fetch commands that allow it to run commands, launch a keylogger, download files, and run additional&nbsp;payloads.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ\/s1600\/ua-2.png\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"1792\" data-original-width=\"3194\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ\/s1600\/ua-2.png\" alt=\"UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign\"\/><\/a><\/div>\n<p>An investigation of about a dozen incidents has revealed that these attacks facilitate reconnaissance, lateral movement, and the theft of credentials and other sensitive data from WhatsApp and Chromium-based&nbsp;browsers. Thisis accomplished by deploying various open-source tools, such as those listed below&nbsp;&#8211;<\/p>\n<ul>\n<li><a href=\"https:\/\/thehackernews.com\/2026\/03\/hackers-use-fake-resumes-to-steal.html\">ChromElevator<\/a>, a program designed to bypass Chromium&#8217;s app-bound encryption (ABE) protections and harvest cookies and saved passwords<\/li>\n<li><a href=\"https:\/\/github.com\/kraftdenker\/ZAPiXDESK\">ZAPiXDESK<\/a>, a forensic extraction tool to decrypt local databases for WhatsApp Web<\/li>\n<li><a href=\"https:\/\/github.com\/bee-san\/RustScan\">RustScan<\/a>, a network scanner<\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2025\/11\/hackers-weaponize-windows-hyper-v-to.html\">Ligolo-Ng<\/a>, a lightweight utility to establish tunnels from reverse TCP\/TLS connections<\/li>\n<li><a href=\"https:\/\/github.com\/jpillora\/chisel\">Chisel<\/a>, a tool for tunneling network traffic over TCP\/UDP<\/li>\n<li>XMRig, a cryptocurrency miner&nbsp;<\/li>\n<\/ul>\n<p>The agency said there is evidence suggesting that representatives of the Defense Forces of Ukraine may also&nbsp;have been&nbsp;targeted as part of the&nbsp;campaign. Thisis&nbsp;based on the distribution of malicious ZIP archives via Signal&nbsp;that are&nbsp;designed to drop AGINGFLY using the DLL side-loading technique.<\/p>\n<p>To mitigate the risk associated with the threat and minimize the attack&nbsp;surface, it&#8217;s recommended to restrict the execution of LNK, HTA, and JS&nbsp;files, along&nbsp;with legitimate utilities such as &#8220;mshta.exe,&#8221; &#8220;powershell.exe,&#8221; and &#8220;wscript.exe.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Computer Emergencies Response Team of Ukraine (CERT-UA)&nbsp;has disclosed details of a new&nbsp;campaign that has&nbsp;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&nbsp;WhatsApp.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45477","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45477"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45477\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}