Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New AgingFly malware used in attacks on Ukraine govt, hospitals
    Cybersecurity

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    adminBy adminApril 16, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New AgingFly malware used in attacks on Ukraine govt, hospitals
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    A new malware family named ‘AgingFly’ has been identified in attacks against local governments and hospitals that steal authentication data from Chromium-based browsers and WhatsApp messenger.

    The attacks were spotted in Ukraine by the country’s CERT team last month. Based on the forensic evidence, targets may also include representatives of the Defense Forces.

    CERT-UA has attributed the attacks to a cyber threat cluster it tracks as UAC-0247.

    Wiz

    Attack chain

    According to the Ukrainian agency, the attack begins with the target receiving an email purporting to be a humanitarian aid offer, which encourages them to click an embedded link.

    The link redirects to a legitimate site that had been compromised via a cross-site scripting (XSS) vulnerability, or to a fake site generated using an AI tool.

    CERT-UA says that the target receives an archive with a shortcut file (LNK) that launches a built-in HTA handler, which in turn connects to a remote resource to retrieve and execute the HTA file.

    The HTA displays a decoy form to divert attention and creates a scheduled task that downloads and runs an EXE payload that injects shellcode into a legitimate process.

    Next, the attackers deploy a two-stage loader in which the second stage uses a custom executable format, and the final payload is compressed and encrypted.

    “A typical TCP reverse shell or an analogue classified as RAVENSHELL can be used as stagers, which provides for establishing a TCP connection with the management server,” CERT-UA says in a report today.

    A TCP connection encrypted using the XOR cipher is established to the C2 server for executing commands via the Command Prompt in Windows.

    In the next stage, the AgingFly malware is delivered and deployed. At the same time, a PowerShell script (SILENTLOOP) is used to execute commands, update the configuration, and retrieve the C2 server address from a Telegram channel or fallback mechanisms.

    The attack chain
    The attack chain
    Source: CERT-UA

    After investigating a dozen such incidents, the researchers determined that the attacker is stealing browser data using the open-source security tool ChromElevator that can decrypt and extract sensitive information, like cookies and saved passwords, from Chromium-based browsers (e.g., Google Chrome, Edge, Brave) without needing administrator privileges.

    The threat actor also tries to extract sensitive data from the WhatsApp application for Windows by decrypting databases using the ZAPiDESK open-source forensic tool.

    According to the researchers, the actor engages in reconnaissance activity and tries to move laterally on the network, and uses publicly available utilities, like the RustScan port scanner, the Ligolo-ng and Chisel tunneling tools. 

    Compiling source code on the host

    AgingFly is a C# malware that provides its operators with remote control, command execution, file exfiltration, screenshot capture, keylogging, and arbitrary code execution.

    It communicates with its C2 server via WebSockets and encrypts the traffic using AES-CBC with a static key.

    The researchers note that a particularity of the AgingFly malware is that it does not include pre-built command handlers; instead, it compiles them on the host from source code received from the C2 server.

    “A distinguishing feature of AGINGFLY compared to similar malware is the absence of built-in command handlers in its code. Instead, they are retrieved from the C2 server as source code and dynamically compiled at runtime,” CERT-UA explains.

    The benefits of this approach include a smaller initial payload, the ability to change or extend capabilities on demand, and the potential to evade static detection.

    However, this unusual approach adds complexity, relies on C2 connectivity, a larger runtime footprint, and ultimately increases detection risk.

    CERT-UA recommends that users block the launch of LNK, HTA, and JS files to disrupt the attack chain used in this campaign.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    AgingFly attacks Govt hospitals Malware Ukraine
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleCapsule Security Emerges From Stealth With $7 Million in Funding
    Next Article Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    admin
    • Website

    Related Posts

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild

    April 18, 2026

    CISA flags Apache ActiveMQ flaw as actively exploited in attacks

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,382)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (846)
    • Tech Tools & Mobile / Apps (1,651)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026
    Most Popular
    • AI traffic converts better than non-AI visits for U.S. retailers: Report
    • Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare
    • $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
    • This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move
    • Equinix offering targets automated AI-centric network operations
    • Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
    • 5 things Claude’s free tier does better than Gemini, ChatGPT, and Perplexity for productivity users who live in documents
    • CISA flags Apache ActiveMQ flaw as actively exploited in attacks
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.